Quiz - Social Engineering

Module 3: Social Engineering Quiz Answers

Which attack vector does an influence campaign rely upon?

Which description best explains pharming?

What type of insider threat is an individual who believes they are exempt from their organization’s security policies and bypasses them?

Which threat indicator could be an indication of an active insider threat?

Which two insider types are considered malicious insider threats? (Choose two.)

Which definition best describes insider threat?

Which two reasons explain why influence campaigns are often effective?

Which three attack methods are examples of social engineering? (Choose three.)

What objective is accomplished by the last two stages of an influence campaign?

What type of attack method is used by a blue hat to study the tactics of bad actors?

Which attack method relies on a telephone or voice-over-IP to target individuals or small groups, such as members of a finance department?

Which technique most accurately describes social engineering?

What social engineering attack uses an online site frequented by the target or targets to attack them?