Social Engineering Questions PDF

Summary

This document contains a series of questions and answers related to social engineering, a type of cybersecurity attack. It covers topics such as phishing, pretexting, and ethical hacking practices.

Full Transcript

What is social engineering? a\) A physical attack on computers b\) Manipulating people to give confidential information c\) Creating viruses d\) A type of hardware attack Which of the following is an example of social engineering? a\) Phishing b\) DDoS attack c\) SQL injection d\) Firewall...

What is social engineering? a\) A physical attack on computers b\) Manipulating people to give confidential information c\) Creating viruses d\) A type of hardware attack Which of the following is an example of social engineering? a\) Phishing b\) DDoS attack c\) SQL injection d\) Firewall installation What is phishing? a\) A technique to protect passwords b\) Sending fake emails to steal information c\) A method of encrypting data d\) A hardware failure What is a common goal of social engineering? a\) To damage hardware b\) To trick people into revealing sensitive information c\) To write secure code d\) To improve network speed Which of the following is a sign of a phishing email? a\) A professional email signature b\) Misspelled words and suspicious links c\) A trusted sender\'s name d\) Secure website links What is pretexting? a\) Creating a fake scenario to trick someone into giving information b\) Encrypting data to secure it c\) Installing antivirus software d\) Writing malware How can you protect yourself from social engineering attacks? a\) By sharing passwords only with friends b\) By verifying requests for sensitive information c\) By using the same password everywhere d\) By avoiding email communication Ethical Hacking What is ethical hacking? a\) Hacking with the intention to harm b\) Hacking to find and fix security weaknesses c\) Creating viruses d\) Breaking into networks for fun What is a white-hat hacker? a\) A hacker who creates malware b\) A hacker who tests security legally c\) A hacker who steals data d\) A hacker who spreads ransomware Which of the following is NOT a type of ethical hacking? a\) Penetration testing b\) Black-box testing c\) Cybercriminal hacking d\) Vulnerability scanning What does a penetration tester do? a\) Protects networks by preventing attacks b\) Tests the security of systems by trying to exploit vulnerabilities c\) Writes secure code d\) Manages firewalls What is reconnaissance in ethical hacking? a\) Gathering information about a target before an attack b\) Executing the attack c\) Removing malware from a system d\) Encrypting the data Which is the first phase in ethical hacking? a\) Scanning b\) Gaining access c\) Reconnaissance d\) Maintaining access What is the purpose of vulnerability scanning? a\) To crash a system b\) To find weak points in a system\'s security c\) To install a virus d\) To back up files Which of the following is a tool used by ethical hackers? a\) Nmap b\) Keylogger c\) Malware d\) Ransomware

Use Quizgecko on...
Browser
Browser