Quiz Complete, well Done!
A common social engineering tactic is to impersonate a
to gain access to secure information.
Which of the following is a common tactic used in social engineering?
Social engineers often exploit
such as fear or urgency to deceive their targets.
Tailgating
Baiting
The goal of social engineering is to gain
access to data or systems.
Why do attackers use social engineering?
What is the first step in preventing social engineering attacks?
Pretexting involves creating a fabricated scenario to obtain
information.
Training employees about social engineering tactics can improve overall
awareness.
How can you protect yourself from social engineering attacks?
Spear Phishing
Which of the following is an example of pretexting?
What is phishing?
Phishing attacks often use fake emails that appear to be from
sources.
One way social engineers gather information is through
on social media profiles.
What is social engineering?
Which social media behavior can increase the risk of social engineering attacks?
Pretexting
What does 'baiting' refer to in social engineering?