Social Engineering Flashcards

2.2 - Explain common threat vectors and attack surfaces 5.6 - Given a scenario, you must be able to implement security awareness practices

1
Q

What is the focus of social engineering?
A. Exploiting software vulnerabilities
B. Manipulating human psychology for unauthorized access
C. Physical theft of confidential data
D. Developing malware for attacks

A

Answer:
B. Manipulating human psychology for unauthorized access

Explanation:

Correct: Social engineering leverages human emotions and behaviors to bypass security.
Incorrect Options:
A: Focuses on technical vulnerabilities.
C: Physical theft is not the focus of social engineering.
D: Malware creation is unrelated to this strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Choose Two)
Which of the following motivational triggers rely on creating psychological pressure?
A. Scarcity
B. Likability
C. Encryption
D. Authority

A

Answer:
A. Scarcity and D. Authority

Explanation:

Correct:
Scarcity creates pressure by emphasizing limited availability.
Authority compels action through perceived hierarchical power.
Incorrect Options:
B: Likability builds rapport but doesn’t create pressure.
C: Encryption is unrelated to psychological strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which motivational trigger involves using hierarchical power to compel individuals to comply?
A. Authority
B. Fear
C. Social Proof
D. Urgency

A

Answer:
A. Authority

Explanation:

Correct: Authority relies on people’s tendency to follow perceived authority figures.
Incorrect Options:
B: Fear uses threats, not hierarchical power.
C: Social Proof relies on observing others, not authority.
D: Urgency emphasizes time pressure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which motivational trigger involves influencing decisions based on observing others’ actions?
A. Likability
B. Social Proof
C. Scarcity
D. Fear

A

Answer:
B. Social Proof

Explanation:

Correct: Social Proof uses the behavior of others to guide decisions.
Incorrect Options:
A: Likability involves rapport-building, not observation.
C: Scarcity focuses on limited resources.
D: Fear employs threats, not group behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary goal of the scarcity motivational trigger?
A. To create rapport with the target
B. To apply pressure by emphasizing limited availability
C. To build trust through perceived authority
D. To compel action using threats

A

Answer:
B. To apply pressure by emphasizing limited availability

Explanation:

Correct: Scarcity manipulates urgency by highlighting limited resources.
Incorrect Options:
A: Creating rapport relates to Likability.
C: Building trust through authority is a separate trigger.
D: Compelling action with threats is the domain of Fear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which motivational trigger relies on building trust through friendliness or shared interests?
A. Likability
B. Authority
C. Urgency
D. Scarcity

A

Answer:
A. Likability

Explanation:

Correct: Likability builds rapport through friendliness or shared interests, including pretending to be a friend or using common interests.
Incorrect Options:
B: Authority leverages hierarchical power, not rapport.
C: Urgency focuses on time sensitivity.
D: Scarcity emphasizes limited availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Choose Three)
Which of the following are examples of Likability in social engineering?
A. Sexual attraction
B. Pretending to be a friend
C. Emphasizing urgency
D. Sharing common interests

A

Answer:
A. Sexual attraction, B. Pretending to be a friend, and D. Sharing common interests

Explanation:

Correct:
Sexual attraction, pretending to be a friend, and sharing common interests are techniques to build rapport using Likability.
Incorrect Option:
C: Urgency is a separate motivational trigger, unrelated to Likability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which motivational trigger relies on the threat of negative consequences?
A. Fear
B. Social Proof
C. Scarcity
D. Authority

A

Answer:
A. Fear

Explanation:

Correct: Fear manipulates individuals by suggesting negative outcomes if they fail to comply.
Incorrect Options:
B: Social Proof influences decisions based on observing others.
C: Scarcity emphasizes limited availability.
D: Authority uses perceived hierarchical power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Choose Two)
Which motivational triggers create urgency to manipulate behavior?
A. Scarcity
B. Social Proof
C. Authority
D. Urgency

A

Answer:
A. Scarcity and D. Urgency

Explanation:

Correct:
Scarcity emphasizes limited resources, creating pressure to act.
Urgency highlights time constraints to compel swift action.
Incorrect Options:
B: Social Proof relies on group behavior, not urgency.
C: Authority compels through hierarchical influence, not urgency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is impersonation in the context of cyberattacks?
A. Exploiting a software vulnerability to steal sensitive data
B. Assuming another person’s identity to gain unauthorized access
C. Deploying malware to disrupt organizational operations
D. Using fake domains to confuse users

A

Answer:
B. Assuming another person’s identity to gain unauthorized access

Explanation:

Correct: Impersonation involves assuming someone else’s identity to gain unauthorized access or steal sensitive data.
Incorrect Options:
A: This describes technical exploitation, not impersonation.
C: Malware is not directly related to impersonation.
D: Fake domains are part of typosquatting, not impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Choose Two)
Which are potential consequences of impersonation attacks?
A. Unauthorized access
B. Complete system takeover
C. Malicious insider hiring
D. Increased network bandwidth

A

Answer:
A. Unauthorized access and B. Complete system takeover

Explanation:

Correct:
Unauthorized access is a direct consequence of impersonation.
Complete system takeover can occur if attackers gain sufficient control.
Incorrect Options:
C: Malicious insider hiring is unrelated.
D: Increased bandwidth usage is unrelated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best describes brand impersonation?
A. Attacker creates a malicious website targeting a trusted brand’s users
B. Attacker pretends to represent a legitimate company or brand
C. Attacker registers a domain name with typographical errors of a popular website
D. Attacker compromises a legitimate website used by their target

A

Answer:
B. Attacker pretends to represent a legitimate company or brand

Explanation:

Correct: Brand impersonation involves attackers pretending to represent a legitimate brand using logos and language.
Incorrect Options:
A: Describes typosquatting, not brand impersonation.
C: Typosquatting involves registering similar domain names.
D: Describes watering hole attacks, not brand impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Choose Three)
Which are effective measures to combat brand impersonation?
A. Educate users about these types of threats
B. Use secure email gateways
C. Register misspelled versions of your domain name
D. Regularly monitor the brand’s online presence

A

Answer:
A. Educate users about these types of threats, B. Use secure email gateways, and D. Regularly monitor the brand’s online presence

Explanation:

Correct:
Educating users helps them recognize brand impersonation attempts.
Secure email gateways filter out phishing emails.
Monitoring the brand’s online presence detects fraudulent activities.
Incorrect Option:
C: Registering misspelled domain names combats typosquatting, not brand impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is typosquatting?
A. A type of phishing email attack
B. A form of impersonation attack using logos and branding
C. Registering domain names with typographical errors of popular websites
D. Compromising a trusted website used by the target

A

Answer:
C. Registering domain names with typographical errors of popular websites

Explanation:

Correct: Typosquatting involves registering domains similar to popular sites to deceive users.
Incorrect Options:
A: Phishing emails are not related to domain registration.
B: Logos and branding are part of brand impersonation.
D: Describes watering hole attacks, not typosquatting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Choose Two)
Which of the following are methods to combat typosquatting?
A. Registering common misspellings of domain names
B. Using secure email gateways
C. Monitoring for similar domain registrations
D. Updating operating systems and software

A

Answer:
A. Registering common misspellings of domain names and C. Monitoring for similar domain registrations

Explanation:

Correct:
Registering common misspellings prevents attackers from exploiting these domains.
Monitoring for similar domain registrations detects malicious intent.
Incorrect Options:
B: Secure email gateways are for phishing, not typosquatting.
D: Updating systems addresses watering hole attacks, not typosquatting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary characteristic of a watering hole attack?
A. Exploiting a domain name with typographical errors
B. Compromising a trusted website used by the target
C. Pretending to represent a legitimate company
D. Sending phishing emails to multiple users

A

Answer:
B. Compromising a trusted website used by the target

Explanation:

Correct: Watering hole attacks involve targeting websites that the victim frequently uses.
Incorrect Options:
A: Typographical errors are related to typosquatting.
C: Representing a company is brand impersonation.
D: Phishing emails are not related to this attack type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(Choose Three)
Which of the following are effective measures to mitigate watering hole attacks?
A. Keep systems and software updated
B. Employ advanced malware detection tools
C. Register common misspellings of domain names
D. Use threat intelligence services

A

Answer:
A. Keep systems and software updated, B. Employ advanced malware detection tools, and D. Use threat intelligence services

Explanation:

Correct:
Updating systems removes vulnerabilities that attackers exploit.
Malware detection tools prevent infections from compromised sites.
Threat intelligence informs organizations about potential threats.
Incorrect Option:
C: Registering misspellings addresses typosquatting, not watering hole attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is pretexting in the context of social engineering?
A. Using urgency to manipulate a victim into acting without thinking
B. Assuming an identity and using believable information to extract more details from the victim
C. Sending phishing emails with links to fake websites
D. Exploiting a victim’s trust by pretending to represent a trusted brand

A

Answer:
B. Assuming an identity and using believable information to extract more details from the victim

Explanation:

Correct: Pretexting involves creating a believable backstory or providing partial information to persuade the victim to share more sensitive details.
Incorrect Options:
A: Urgency manipulation describes a different social engineering technique.
C: This describes phishing, not pretexting.
D: Representing a brand refers to brand impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(Choose Two)
Which of the following best describe the key elements of a pretexting attack?
A. Providing partial, seemingly true information to the victim
B. Exploiting typographical errors to deceive users
C. Using a fabricated scenario to elicit sensitive details from the victim
D. Directly hacking into a victim’s system without interaction

A

Answer:
A. Providing partial, seemingly true information to the victim and C. Using a fabricated scenario to elicit sensitive details from the victim

Explanation:

Correct:
A pretexting attack uses believable but partial information to gain trust and extract further details.
It involves creating a false but plausible scenario to manipulate the victim.
Incorrect Options:
B: Exploiting typographical errors relates to typosquatting.
D: Pretexting is a social engineering technique, not a direct hacking attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary goal of a pretexting attack?
A. To create a sense of urgency and rush the victim into action
B. To manipulate the victim into sharing additional information by building a false context
C. To compromise a website frequently visited by the victim
D. To mimic a legitimate company for financial gain

A

Answer:
B. To manipulate the victim into sharing additional information by building a false context

Explanation:

Correct: Pretexting uses fabricated scenarios to manipulate victims into revealing sensitive information.
Incorrect Options:
A: Urgency is associated with other social engineering techniques like phishing.
C: Compromising websites relates to watering hole attacks.
D: Mimicking companies is brand impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(Choose Two)
Which of the following are effective methods to mitigate pretexting attacks?
A. Training employees to identify and resist pretext attempts
B. Encouraging employees to fill in information gaps when asked
C. Using advanced malware detection tools
D. Instructing employees not to provide additional information beyond what’s requested

A

Answer:
A. Training employees to identify and resist pretext attempts and D. Instructing employees not to provide additional information beyond what’s requested

Explanation:

Correct:
Employee training ensures they are aware of pretexting techniques and can recognize them.
Avoiding providing unsolicited information prevents attackers from exploiting gaps.
Incorrect Options:
B: Filling in gaps directly aids pretexting attackers.
C: Malware detection tools are not directly related to pretexting mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What key concept should employees remember to avoid falling victim to pretexting attacks?
A. Always verify a caller’s identity and provide minimal information
B. Respond quickly to any requests involving sensitive data
C. Trust any individual who provides partial correct information
D. Assume that all requests from colleagues are legitimate

A

Answer:
A. Always verify a caller’s identity and provide minimal information

Explanation:

Correct: Verifying identity and providing only necessary information are essential to counter pretexting.
Incorrect Options:
B: Acting quickly without verification aids attackers.
C: Trusting partial information can lead to falling victim.
D: Requests from colleagues should be verified for authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the primary goal of phishing attacks?
A. To compromise websites frequently visited by victims
B. To send fraudulent communications that trick individuals into revealing sensitive information
C. To impersonate a trusted brand and steal intellectual property
D. To target executives in an organization using sophisticated malware

A

Answer:
B. To send fraudulent communications that trick individuals into revealing sensitive information

Explanation:

Correct: Phishing involves sending fraudulent emails or messages to trick victims into revealing personal or sensitive information.
Incorrect Options:
A: This describes watering hole attacks.
C: Impersonating a brand is a more specific form of impersonation but not phishing as a whole.
D: Targeting executives specifically refers to whaling.

24
Q

Which type of phishing attack focuses on targeting specific groups or individuals?
A. Phishing
B. Spear Phishing
C. Whaling
D. Vishing

A

Answer:
B. Spear Phishing

Explanation:

Correct: Spear phishing is a more targeted form of phishing aimed at specific groups or individuals, making it more effective.
Incorrect Options:
A: Phishing is a broader attack targeting a larger, nonspecific audience.
C: Whaling specifically targets high-profile individuals, a subset of spear phishing.
D: Vishing refers to voice-based phishing attacks.

25
Q

What distinguishes whaling from other forms of phishing?
A. It targets employees at all levels of an organization equally.
B. It is focused on high-profile individuals like CEOs or executives.
C. It uses SMS messages to trick victims into revealing information.
D. It involves compromising websites to gain sensitive data.

A

Answer:
B. It is focused on high-profile individuals like CEOs or executives.

Explanation:

Correct: Whaling targets high-profile individuals such as executives for potentially greater rewards.
Incorrect Options:
A: Whaling focuses specifically on high-level individuals, not employees at all levels.
C: SMS phishing is referred to as smishing.
D: Compromising websites describes watering hole attacks.

26
Q

(Choose Two)
Which of the following describe Business Email Compromise (BEC) attacks?
A. Using fraudulent emails to gather sensitive information from executives.
B. Taking control of a legitimate business email account to carry out malicious actions.
C. Sending mass emails to trick individuals into revealing personal details.
D. Conducting unauthorized fund transfers or stealing sensitive business data.

A

Answer:
B. Taking control of a legitimate business email account to carry out malicious actions and D. Conducting unauthorized fund transfers or stealing sensitive business data

Explanation:

Correct:
BEC involves compromising internal business email accounts for malicious purposes.
It often includes financial theft or sensitive data extraction.
Incorrect Options:
A: Targeting executives specifically aligns with whaling.
C: Sending mass emails is typical of basic phishing, not BEC.

27
Q

What differentiates vishing from other types of phishing attacks?
A. It involves the use of fraudulent emails to steal data.
B. It uses phone calls to trick victims into revealing information.
C. It targets specific high-level individuals in an organization.
D. It sends text messages to deceive victims.

A

Answer:
B. It uses phone calls to trick victims into revealing information.

Explanation:

Correct: Vishing relies on voice-based communication (phone calls) to extract sensitive information.
Incorrect Options:
A: Fraudulent emails are associated with traditional phishing.
C: Targeting executives specifically aligns with whaling.
D: Text messages are used in smishing.

28
Q

What is smishing?
A. Phishing attacks conducted via phone calls.
B. Sending emails that appear to be from a trusted brand.
C. Using text messages to deceive victims into revealing personal information.
D. Compromising websites visited frequently by victims.

A

Answer:
C. Using text messages to deceive victims into revealing personal information.

Explanation:

Correct: Smishing involves using SMS (text messages) to trick individuals into providing sensitive information.
Incorrect Options:
A: Phone calls are used in vishing, not smishing.
B: Sending fraudulent emails is traditional phishing or BEC.
D: Compromising websites aligns with watering hole attacks.

29
Q

(Choose Three)
Which of the following are types of phishing attacks?
A. Whaling
B. Typosquatting
C. Vishing
D. Spear Phishing
E. Watering Hole

A

Answer:
A. Whaling, C. Vishing, and D. Spear Phishing

Explanation:

Correct:
Whaling targets high-profile individuals like executives.
Vishing uses phone calls for phishing attacks.
Spear phishing focuses on specific groups or individuals.
Incorrect Options:
B: Typosquatting refers to URL-based deception, not phishing.
E: Watering hole attacks involve compromising frequently visited websites.

30
Q

Which type of phishing attack is most likely to target a CEO or CFO?
A. Smishing
B. Vishing
C. Spear Phishing
D. Whaling

A

Answer:
D. Whaling

Explanation:

Correct: Whaling specifically targets high-profile individuals like executives to achieve greater rewards.
Incorrect Options:
A: Smishing involves text messages.
B: Vishing uses voice calls.
C: Spear phishing targets groups or individuals but doesn’t exclusively focus on executives.

31
Q

What is the primary goal of an anti-phishing campaign?
A. To block phishing emails using filters
B. To educate individuals on identifying phishing attempts and offer remedial training for victims
C. To prevent phishing entirely through software solutions
D. To simulate phishing attacks without follow-up training

A

Answer:
B. To educate individuals on identifying phishing attempts and offer remedial training for victims

Explanation:

Correct: Anti-phishing campaigns focus on raising awareness, educating users, and providing remedial training for those who fall victim to simulated phishing attempts.
Incorrect Options:
A: Blocking phishing emails is more related to email filters than awareness campaigns.
C: Prevention requires a combination of training and technical measures.
D: Simulated phishing without follow-up training is ineffective.

32
Q

(Choose Two)
Which measures are crucial for preventing phishing attacks in an organization?
A. Regularly updating firewall configurations
B. Conducting regular user security awareness training
C. Using email filters to block suspicious emails
D. Training employees to identify phishing techniques

A

Answer:
B. Conducting regular user security awareness training and D. Training employees to identify phishing techniques

Explanation:

Correct:
Regular training ensures users stay informed about various phishing techniques and threats.
Educating employees empowers them to identify phishing attempts effectively.
Incorrect Options:
A: Firewalls are part of overall cybersecurity but not specific to phishing prevention.
C: While email filters are useful, they don’t replace the need for user training.

33
Q

Why is urgency often included in phishing emails?
A. To improve the readability of the email
B. To trick recipients into acting without thinking
C. To verify the recipient’s response time
D. To avoid triggering spam filters

A

Answer:
B. To trick recipients into acting without thinking

Explanation:

Correct: Phishing emails create urgency to pressure victims into making impulsive decisions, such as clicking on links or sharing sensitive information.
Incorrect Options:
A: Readability is unrelated to urgency.
C: Phishers aim to exploit emotions, not response times.
D: Avoiding spam filters involves other techniques, like avoiding certain keywords.

34
Q

What should you do when encountering mismatched URLs in an email?
A. Delete the email immediately without checking further
B. Click the link to verify where it leads
C. Hover over the link to check if the display text matches the actual URL
D. Ignore the email as long as it comes from a known sender

A

Answer:
C. Hover over the link to check if the display text matches the actual URL

Explanation:

Correct: Hovering over links allows you to view the actual URL and verify its legitimacy without clicking.
Incorrect Options:
A: Deleting the email is premature without proper verification.
B: Clicking the link may lead to malicious sites.
D: Even emails from known senders can be spoofed.

35
Q

Which of the following is a common sign of a phishing email?
A. Clear and professional language
B. Emails sent from trusted domains only
C. Poor spelling or grammar
D. Consistent email addresses

A

Answer:
C. Poor spelling or grammar

Explanation:

Correct: Phishing emails often contain grammatical errors or awkward phrasing, which can signal a scam.
Incorrect Options:
A: Professional language is rare in phishing emails.
B: Phishing emails can appear to be sent from trusted domains via spoofing.
D: Inconsistent or strange email addresses are more typical of phishing campaigns.

36
Q

What should an organization do after a phishing email has been opened by an employee?
A. Immediately block the employee’s email account
B. Ignore the event if no harm was done
C. Conduct a quick investigation and triage the user’s system
D. Publicly disclose the incident to all employees

A

Answer:
C. Conduct a quick investigation and triage the user’s system

Explanation:

Correct: Investigating and securing the compromised system ensures the threat is contained.
Incorrect Options:
A: Blocking the account may not address the underlying issue.
B: Ignoring the event increases risk.
D: Public disclosure is unnecessary unless it aids awareness or containment.

37
Q

(Choose Three)
Which of the following are effective mitigation techniques against phishing attacks?
A. Conducting user security awareness training
B. Reporting suspicious messages to security teams
C. Limiting access to external email services
D. Analyzing phishing threats and revising security measures

A

Answer:
A. Conducting user security awareness training, B. Reporting suspicious messages to security teams, and D. Analyzing phishing threats and revising security measures

Explanation:

Correct:
Awareness training reduces user vulnerability.
Reporting suspicious messages prevents further exposure.
Threat analysis and security updates help prevent future attacks.
Incorrect Options:
C: Limiting access to external email services is not a comprehensive phishing mitigation strategy.

38
Q

What is a common online form of fraud where an attacker uses a victim’s personal information to commit a crime?
A. Phishing
B. Identity Fraud
C. Vishing
D. Invoice Scam

A

Answer:
B. Identity Fraud

Explanation:

Correct: Identity fraud involves using a victim’s personal information, such as credit card numbers, without their authorization for deceptive or fraudulent purposes.
Incorrect Options:
A: Phishing is a broader technique for stealing sensitive information.
C: Vishing is phishing conducted over the phone.
D: Invoice scams involve tricking someone into paying for fake invoices, which is not the same as identity fraud.

39
Q

Which of the following best describes the difference between identity fraud and identity theft?
A. Identity fraud targets financial accounts, while identity theft targets personal relationships.
B. Identity fraud involves using a credit card, while identity theft involves fully assuming the victim’s identity.
C. Identity fraud requires physical access, while identity theft does not.
D. Identity fraud is unintentional, while identity theft is always deliberate.

A

Answer:
B. Identity fraud involves using a credit card, while identity theft involves fully assuming the victim’s identity.

Explanation:

Correct: Identity fraud typically involves unauthorized use of financial information, such as credit card numbers, while identity theft focuses on fully impersonating the victim.
Incorrect Options:
A: Identity theft doesn’t target personal relationships; it targets personal identities.
C: Neither type necessarily requires physical access.
D: Both fraud and theft are deliberate actions.

40
Q

What is the most common scam that targets businesses and individuals by tricking them into paying for services or products they didn’t order?
A. Ransomware
B. Invoice Scam
C. Pretexting
D. Credential Stuffing

A

Answer:
B. Invoice Scam

Explanation:

Correct: Invoice scams trick victims into paying for fake invoices, which is a widespread type of fraud.
Incorrect Options:
A: Ransomware locks access to systems until a ransom is paid.
C: Pretexting involves creating a false scenario to gain information.
D: Credential stuffing involves using stolen credentials for unauthorized access.

41
Q

An employee receives an invoice for services their company never ordered. What should they do as part of a security awareness practice?
A. Pay the invoice to avoid legal trouble
B. Verify the invoice with the sender before paying
C. Report the invoice to the finance or security team
D. Ignore the invoice as it’s likely a scam

A

Answer:
C. Report the invoice to the finance or security team

Explanation:

Correct: Reporting suspicious invoices allows the company to investigate and prevent financial losses due to scams.
Incorrect Options:
A: Paying without verification increases vulnerability to scams.
B: Verifying with the sender could be risky if the sender is the scammer.
D: Ignoring could miss legitimate issues or recurring scams.

42
Q

An attacker uses an employee’s stolen personal information to gain access to company systems. What should employees be trained to do to mitigate such risks?
A. Regularly change passwords and monitor personal accounts for unusual activity
B. Avoid using company devices for personal activities
C. Forward suspicious emails to colleagues for validation
D. Share only partial personal information when requested

A

Answer:
A. Regularly change passwords and monitor personal accounts for unusual activity

Explanation:

Correct: Training employees to proactively change passwords and monitor accounts helps minimize risks of identity theft affecting the workplace.
Incorrect Options:
B: While good practice, this doesn’t directly address identity theft.
C: Forwarding suspicious emails could propagate phishing or fraud attempts.
D: Sharing personal information, even partially, can still expose employees to risks.

43
Q

What should organizations include in their security awareness training to prevent invoice scams?
A. Training employees to authenticate all invoices with trusted vendors
B. Using automated systems to approve all invoices
C. Delegating invoice verification to entry-level employees
D. Encrypting all financial transactions

A

Answer:
A. Training employees to authenticate all invoices with trusted vendors

Explanation:

Correct: Verifying invoices ensures that only legitimate payments are made.
Incorrect Options:
B: Automation doesn’t replace human verification for detecting scams.
C: Entry-level employees may lack the expertise to recognize scams.
D: Encryption doesn’t address the issue of fake invoices.

44
Q

What is the primary difference between misinformation and disinformation in the context of influence campaigns?
A. Misinformation is created intentionally to deceive, while disinformation is shared unintentionally.
B. Misinformation is shared with harmful intent, while disinformation is shared without any intent.
C. Misinformation is inaccurate information shared without malicious intent, while disinformation is created with the intent to deceive.
D. Misinformation and disinformation are identical and serve the same purpose in influencing campaigns.

A

Answer:
C. Misinformation is inaccurate information shared without malicious intent, while disinformation is created with the intent to deceive.

Explanation:

Correct: Misinformation is shared without harmful intent, while disinformation involves deliberate deception.
Incorrect Options:
A: Misinformation is not created to deceive.
B: Misinformation is not intentionally harmful.
D: Misinformation and disinformation have distinct intentions.

45
Q

Influence campaigns can impact public perception. What is a consequence of widespread misinformation and disinformation?
A. Increased public trust in institutions
B. Strengthened social unity
C. Fueling social divisions and undermining public trust
D. Enhanced credibility of government institutions

A

Answer:
C. Fueling social divisions and undermining public trust

Explanation:

Correct: Misinformation and disinformation can undermine trust and cause social harm.
Incorrect Options:
A: Misinformation and disinformation often reduce trust in institutions.
B: Social divisions are often the result of misinformation and disinformation.
D: Misinformation undermines credibility, not strengthens it.

46
Q

What is the primary goal of an influence campaign involving misinformation and disinformation?
A. To provide accurate information to the public
B. To shape public opinion or behavior toward a particular cause, individual, or group
C. To prevent public confusion and misinformation
D. To encourage open debates on political issues

A

Answer:
B. To shape public opinion or behavior toward a particular cause, individual, or group

Explanation:

Correct: Influence campaigns aim to influence perception or behavior, often through misinformation or disinformation.
Incorrect Options:
A: Influence campaigns typically spread inaccurate information.
C: The goal is often to mislead, not prevent confusion.
D: These campaigns are designed to sway opinion, not encourage open debates.

47
Q

You notice a post on social media claiming that a well-known politician has been involved in a scandal, but you cannot find any credible sources to confirm the claim. What is the best course of action to take based on security awareness practices?
A. Share the post with your followers as it might be true.
B. Ignore the post as it’s probably not true.
C. Verify the information through multiple trusted sources before forming or sharing an opinion.
D. Respond to the post, warning others about the potential scandal.

A

Answer:
C. Verify the information through multiple trusted sources before forming or sharing an opinion.

Explanation:

Correct: Always verify information through credible sources to prevent the spread of misinformation or disinformation.
Incorrect Options:
A: Sharing unverified information can contribute to spreading false claims.
B: Ignoring could result in missing critical information, but verification is key.
D: Responding without verification can contribute to misinformation.

48
Q

A popular online influencer shares a misleading article about a recent political event. What should you do to mitigate the risk of sharing false information?
A. Immediately share the article to spread awareness of the event.
B. Conduct your own research from reputable sources to confirm the details.
C. Assume the article is truthful because it’s shared by a trusted figure.
D. Ignore the article and assume someone else will fact-check it.

A

Answer:
B. Conduct your own research from reputable sources to confirm the details.

Explanation:

Correct: Always conduct your own research and verify the facts using trusted, credible sources.
Incorrect Options:
A: Sharing unverified articles spreads misinformation.
C: Trusting without verification can lead to the spread of false information.
D: Relying on others for fact-checking can be risky without personal due diligence.

49
Q

As part of a security awareness initiative, how can organizations help employees recognize influence campaigns that may be based on misinformation or disinformation?
A. Encourage employees to share articles and opinions immediately to spread awareness.
B. Provide training on how to identify reliable sources and spot signs of false information.
C. Instruct employees to ignore all online content they consider suspicious.
D. Promote only one-sided views to ensure consistency in messaging.

A

Answer:
B. Provide training on how to identify reliable sources and spot signs of false information.

Explanation:

Correct: Training employees to recognize reliable sources and identify misinformation or disinformation is key to prevention.
Incorrect Options:
A: Encouraging immediate sharing without verification spreads false information.
C: Ignoring suspicious content doesn’t help in developing critical analysis skills.
D: Promoting one-sided views can lead to biased information and further misinformation.

50
Q

Which of the following best describes the threat vector of “Diversion Theft”?
A. Manipulating a situation or creating a distraction to steal valuable items or information
B. Using social media to spread malicious deception and gain personal information
C. Searching through trash to find discarded documents with sensitive information
D. Intercepting communications without the knowledge of the parties involved

A

Answer:
A. Manipulating a situation or creating a distraction to steal valuable items or information

Explanation:

Correct: Diversion theft is about creating distractions to steal items or information.
Incorrect Options:
B: That describes hoaxes, not diversion theft.
C: Dumpster diving is about searching through trash for sensitive documents.
D: Eavesdropping involves secretly listening to private conversations.

51
Q

What is the primary method of “Shoulder Surfing”?
A. Using high-powered cameras to steal information from a distance
B. Searching through trash to find discarded personal documents
C. Intercepting private conversations without the parties’ knowledge
D. Looking over someone’s shoulder to gather personal information

A

Answer:
D. Looking over someone’s shoulder to gather personal information

Explanation:

Correct: Shoulder surfing involves observing someone’s private information, typically in public spaces.
Incorrect Options:
A: High-powered cameras can be used in shoulder surfing but are not the main method.
B: Dumpster diving is the act of searching through trash, not observing people.
C: Eavesdropping involves listening to private conversations, not shoulder surfing.

52
Q

Which social engineering attack involves using a physical device, like a USB drive, to infect a computer with malware when found and used by a victim?
A. Baiting
B. Hoaxes
C. Shoulder Surfing
D. Tailgating

A

Answer:
A. Baiting

Explanation:

Correct: Baiting involves leaving an infected device for someone to unknowingly use, infecting their system.
Incorrect Options:
B: Hoaxes involve malicious deception, typically through communication channels.
C: Shoulder surfing involves observing someone’s information, not using devices.
D: Tailgating refers to unauthorized access by following someone into a secure area.

53
Q

What is the primary prevention method for “Eavesdropping” attacks?
A. Encrypting data in transit
B. Fact-checking information
C. Ensuring employees have strong access badges
D. Providing critical thinking training

A

Answer:
A. Encrypting data in transit

Explanation:

Correct: Encrypting data protects communications from being intercepted.
Incorrect Options:
B: Fact-checking is useful for hoaxes, not for preventing eavesdropping.
C: Access control is important for preventing physical breaches, not eavesdropping.
D: Critical thinking helps with hoaxes but not with eavesdropping prevention.

54
Q

You are working in an office, and you notice someone is standing very close to your desk, watching you enter your password. What should you do to mitigate the risk of “Shoulder Surfing”?
A. Ignore the situation since it’s a public place.
B. Politely ask the person to move away from your desk to protect your privacy.
C. Continue typing your password without addressing the person.
D. Change your password immediately after they leave.

A

Answer:
B. Politely ask the person to move away from your desk to protect your privacy.

Explanation:

Correct: Asking someone to move away helps maintain privacy and avoid shoulder surfing.
Incorrect Options:
A: Ignoring the situation doesn’t protect your sensitive information.
C: Continuing without addressing the issue allows the person to gather information.
D: Changing your password isn’t necessary unless you suspect it has been compromised.

55
Q

If an attacker tries to follow an employee into a secure building without using their own access card, this is an example of:
A. Piggybacking
B. Shoulder Surfing
C. Tailgating
D. Baiting

A

Answer:
C. Tailgating

Explanation:

Correct: Tailgating is when an attacker follows an authorized person into a secure area.
Incorrect Options:
A: Piggybacking involves getting an employee to let them in by swiping the badge.
B: Shoulder surfing involves observing someone’s private information.
D: Baiting is about leaving a malware-infected device for someone to find.

56
Q

What is an effective way to prevent “Dumpster Diving” in an organization?
A. Train employees to recognize phishing emails
B. Regularly shred discarded documents containing sensitive information
C. Encrypt sensitive information in all communications
D. Use high-powered cameras to monitor public spaces

A

Answer:
B. Regularly shred discarded documents containing sensitive information

Explanation:

Correct: Shredding documents ensures that sensitive information cannot be recovered from trash.
Incorrect Options:
A: Phishing prevention helps, but it doesn’t stop dumpster diving.
C: Encryption protects data in transit, but not discarded physical documents.
D: Monitoring public spaces is not a solution to dumpster diving.