Social Engineering Techniques and Risks

Social Engineering Techniques and Risks

Assessment

Flashcard

Information Technology (IT)

11th Grade

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

15 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Emma is trying to gain unauthorized access to a company's network. Which two steps in her hacking process are most likely to involve the use of social engineering? (Scanning / Probing, Escalating Privileges, Exploiting, Recon / footprinting, Gaining Access)

Back

Recon / footprinting, Gaining Access

Answer explanation

Social engineering is often used in 'Recon / footprinting' to gather information about targets and in 'Gaining Access' to manipulate individuals into providing access or sensitive information.

2.

FLASHCARD QUESTION

Front

Elijah received a phone call from someone claiming to be from his bank, asking for his account details to verify a transaction. What is the goal of this social engineering attempt?

Back

To get an authorized user to give information to an unauthorized person

Answer explanation

The goal of social engineering is to manipulate an authorized user into divulging confidential information to an unauthorized person, making the correct answer "To get an authorized user to give information to an unauthorized person."

3.

FLASHCARD QUESTION

Front

Scarlett received an email from someone pretending to be her bank, asking for her account details. What is the main method used in this type of social engineering?

Back

Deception

Answer explanation

The main method used in social engineering is deception. Attackers manipulate individuals into divulging confidential information by exploiting trust, rather than using technical methods like brute force or complex algorithms.

4.

FLASHCARD QUESTION

Front

David received an email from someone claiming to be his bank, asking for his account details. Which is NOT a reason that Social Engineering tactics like this are so successful?

Back

Humans are good at problem solving

Answer explanation

Humans being good at problem solving is not a reason for social engineering's success. In fact, effective problem solving can help individuals recognize and resist manipulation, unlike the other options that exploit human tendencies.

5.

FLASHCARD QUESTION

Front

At a busy office building, which Social Engineering technique is best protected against by having a security guard or turnstile at the entrance? Options: Shoulder Surfing, Dumpster Diving, Baiting, Piggybacking

Back

Piggybacking

Answer explanation

Piggybacking involves unauthorized individuals gaining access by following someone with legitimate access. A security guard or turnstile can effectively prevent this by controlling entry, unlike the other techniques listed.

6.

FLASHCARD QUESTION

Front

During a cybersecurity class, Harper learned about a technique that was responsible for 67% of cyber attacks last year. What is this major threat in the digital world?

Back

Phishing

Answer explanation

Phishing is the most significant threat in the digital world, accounting for 67% of cyber attacks last year. It involves tricking individuals into revealing sensitive information, making it a prevalent tactic among cybercriminals.

7.

FLASHCARD QUESTION

Front

Olivia received an email that seemed suspicious. Which of the following is NOT an indication that the email might be a phishing email?
- URL doesn't match the text
- Misspellings
- Sender and email address don't match
- Email was sent in the middle of the night

Back

Email was sent in the middle of the night

Answer explanation

The correct choice is 'Email was sent in the middle of the night' because the time an email is sent does not inherently indicate phishing. In contrast, mismatched URLs, misspellings, and inconsistent sender details are common phishing signs.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?