• 1. 
    Phishing takes place using.... (Select 2 answers)

  • Website
  • E-mail
  • Piggybacking
  • Both A & B
  • 2. 
    Training and education of end users can be used to prevent ...

  • Phishing
  • Tailgating
  • Session hijacking
  • Both A & B
  • 3. 
    Social engineering can use all the following except ....

  • Mobile phone
  • Instant message
  • Viruses
  • Trojan horse
  • 4. 
    Phishing can be mitigated through the use of ...

  • Spam filtering
  • Education
  • Antivirus
  • Both A & B
  • 5. 
    Social engineering can be thwarted using what kinds of controls?

  • Technical
  • Administrative
  • Physical
  • All of above
  • 6. 
    Social engineering is designed to ...

  • Manipulate human behavior
  • Make people distrustful
  • Negotiate to say yes
  • Gain a physical advantage
  • 7. 
    "Hi! This is Sulaiman, CFO Secretary. I'm working on an urgent project and lost my system password. Can you help me out? ” Which one is correct of this human-based Social Engineering?

  • Posing as an important user
  • Posing as a legitimate end user
  • Posing as technical support
  • Third Party Authorization
  • 8. 
    ______ are emails that issue warnings to the user on new viruses, Trojan or Worms that may harm the user's system

  • Chain letters
  • Hoax letters
  • Spam emails
  • Pop-up windows
  • 9. 
    Read the Question on the image

  • Phising
  • Spam
  • Vishing
  • Piggybacking
Report Question
warning
access_time
  Time