The art of convincing people to reveal confidential information.
a. Dumpster Diving
b. Eavesdropping
c. Social Engineering
d. Shoulder Surfing
c. Social Engineering
Social Engineering Techniques:
b. Eavesdropping
Social Engineering Techniques:
d. Shoulding Surfing
Social Engineering Techniques:
a. Dumpster Diving
Who alow is a dirty pig !
Social Engineering Techniques:
a. Piggybacking
The difference between the two terms is that piggybacking implies that the person who has opened the door with their credentials knows that others are following them in through the secure door. Tailgating means that others are following through the door without the knowledge of the person who has opened the door.
Social Engineering Techniques:
b. Tailgating
Social Engineering Techniques:
Is a practice of sending an illegitimate email falsely claiming to be from a legitimate site in an attempts to acquire a user’s personal or account information.
a. Pharming
b. Whaling
c. Spear Phishing
d. Phishing
d. Phishing
Social Engineering Techniques:
An attacker targets high profile executives like CEO, CFO, politicians and celebrities who have complete access to confidential and highly valuable information.
a. Pharming
b. Whaling
c. Spear Phishing
d. Phishing
b. Whaling
Social Engineering Techniques:
c. Spear Phishing
Social Engineering Techniques:
a. Pharming
_____ ____ occurs when someone steals your personally identifiable information for fraudulent purposes.
Identity Theft
Countermeasures:
What are the correct examples of 2 Factor & Multifactor Authentication?
a. Username
b. CAC & PIN
c. Password
d. Fingerprint Scan (Biometric)
e. Username/Password & Biometric
f. CAC/PIN & Biometric
b. CAC & PIC
e. Username/Password & Biometric
f. CAC/PIN & Biometric
CAC