Podcast
Questions and Answers
Which of the following is an example of social engineering?
Which of the following is an example of social engineering?
- Installing antivirus software on a computer
- Someone claiming to be a delivery person to gain access to the building (correct)
- Encrypting sensitive emails
- Using strong passwords to protect data
What is an example of pretexting?
What is an example of pretexting?
- Claiming to be an auditor and requesting sensitive information (correct)
- Installing firewalls to protect a network
- Creating a strong password for a computer system
- Using two-factor authentication for account security
Which of the following is a form of social engineering attack?
Which of the following is a form of social engineering attack?
- Pretending to be locked out of a computer and asking to borrow someone else's (correct)
- Enforcing strict password policies
- Implementing biometric authentication for access control
- Regularly updating software to patch security vulnerabilities
What is an example of piggybacking in the context of security?
What is an example of piggybacking in the context of security?
What is the primary goal of social engineering?
What is the primary goal of social engineering?