The art of convincing people to reveal confidential information.
a. Dumpster Diving
b. Eavesdropping
c. Social Engineering
d. Shoulder Surfing
c. Social Engineering
Social Engineering Techniques:
b. Eavesdropping
Social Engineering Techniques:
d. Shoulding Surfing
Social Engineering Techniques:
a. Dumpster Diving
Social Engineering Techniques:
a. Piggybacking
Social Engineering Techniques:
b. Tailgating
Social Engineering Techniques:
Is a practice of sending an illegitimate email falsely claiming to be from a legitimate site in an attempts to acquire a user’s personal or account information.
a. Pharming
b. Whaling
c. Spear Phishing
d. Phishing
d. Phishing
Social Engineering Techniques:
An attacker targets high profile executives like CEO, CFO, politicians and celebrities who have complete access to confidential and highly valuable information.
a. Pharming
b. Whaling
c. Spear Phishing
d. Phishing
b. Whaling
Social Engineering Techniques:
c. Spear Phishing
Social Engineering Techniques:
a. Pharming
_____ ____ occurs when someone steals your personally identifiable information for fraudulent purposes.
Identity Theft
Countermeasures:
What are the correct examples of 2 Factor & Multifactor Authentication?
a. Username
b. CAC & PIN
c. Password
d. Fingerprint Scan (Biometric)
e. Username/Password & Biometric
f. CAC/PIN & Biometric
b. CAC & PIC
e. Username/Password & Biometric
f. CAC/PIN & Biometric