1. A phishing attack is performed over ____________________.
A) Messages B) Phone Calls C) E-mails D) File Sharing
2. Basic Purpose of Social Engineering attacks are ________________.
A) Stealing information from humans B) Stealing information from Network Devices C) Stealing information from compromised Social Networking sites D) Compromising social accounts
3. Which of the following is not a type of Human-based Social Engineering?
A) Impersonation B) Reverse Social Engineering C) Piggybacking & Tailgating D) Phishing
4. Attack performed by a disgruntled employee of an organization is called ________.
A) Insiders Attack B) Internal Attack C) Vulnerability D) Loophole
5. To defend against a phishing attack, a necessary step is ____________________.
A) Spam Filtering B) Traffic Monitoring C) E-mail Tracking D) Education & Training
1. Right Answer: A Explanation: Phishing process is a technique in which Fake E-mail, which looks like legitimate E-mail, is sent to a target host. When the recipient opens the link, he is enticed to provide information.
2. Right Answer: D Explanation: Social Engineering is an act of stealing information from humans. As it does not have any interaction with target system or network, it is considered as a non-technical attack.
3. Right Answer: A Explanation: Human-based Social Engineering includes one-to-one interaction with the target. Social Engineer gathers sensitive information by tricking the users; for example, ensuring the trust, taking advantage of habits, behavior and moral obligation.
4. Right Answer: A Explanation: Insider attack includes attacks performed by an employee of an organization, who has been paid for it to do so by the competitor or attacker, or a disgruntled employee.
5. Right Answer: B Explanation: Spam filtering is a necessary step to avoid phishing email, which reduces the threat of unintentionally clicking on spam emails.
Leave a comment