A social engineer uses various deceptive practices to convince the targeted pers
ID: 3739038 • Letter: A
Question
A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target of the attack to do something they normally wouldn’t do.
True
False
A user installs unauthorized communication software on a modem allowing her to connect to her machine at work from home via that modem. What outcome may result from this action?
A rogue access point may be created.
A DNS spoofing attack may occur.
A vishing attack may occur.
Shoulder surfing occurs when the attacker simply looks over the shoulder of a user at work, watching as a coworker enters their password.
True
False
A man trap may occur.
Dumpster diving occurs when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.
True
False
Phishing is the most common form of social engineering attack related to computer security.
true or false
Setting up a rogue access point is a good way to prevent social engineering attacks.
True
False
A user receives an e-mail warning of a dangerous computer virus and instructing the user to delete files it claims were put there by the virus. However, the files are actually critical system files. Which term describes this scenario?
Social engineering
Reverse social engineering
A hoax
Phishing
True
False
Explanation / Answer
A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target of the attack to do something they normally wouldn’t do.
Answer:
True
Explanation:
Social engineering is a technique in which the attacker uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge, or to convince the target to do something they normally wouldn't do:
Shoulder surfing occurs when the attacker simply looks over the shoulder of a user at work, watching as a coworker enters their password.
Answer:
True
Explanation:
Shoulder surfing is a technique that is commonly used by hackers. Their ... Shoulder surfing is watching someone use their computer from “over their shoulder”. ... If the person wasn't attheir keyboard, or out sick, and I needed to work on their system, co-workers knew the password of the missing person.
Dumpster diving occurs when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.
Answer:
False
Explanation:
Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques to gain access to the network. To prevent dumpster divers from learning anything valuable from your trash, experts recommend that your company establish a disposal policy where all paper, including print-outs, is shredded in a cross-cut shredder before being recycled, all storage media is erased, and all staff is educated about the danger of untracked trash.
Phishing is the most common form of social engineering attack related to computer security.
Answer:
True
Explanation:
Phishing is the fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords. Using a complex set of social engineering techniques and computer programming expertise, phishing websites lure email recipients and Web users into believing that a spoofed website is legitimate and genuine. In actuality, the phishing victim later discovers his personal identity and other vital information have been stolen and exposed.
A user receives an e-mail warning of a dangerous computer virus and instructing the user to delete files it claims were put there by the virus. However, the files are actually critical system files. Which term describes this scenario?
Answer:
A hoax
Explanation:
A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipients to forward it to everyone they know.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.