Social engineering — users are the weakest link
Social engineering in the IT context is...
a term used for various malicious activities made through human interactions
a term referring to IT engineers working for a social purpose
a term used to describe technology derived from AI
What is NOT considered sensitive data?
health-related data
IP numer
political opinions
Locating sensitive and important data in one place is a good idea.
False
True
Raising awareness about technical engineering is crucial
True
False
Phishing, the most popular social engineering technique, is...
any kind of messaging campaign planned to redirect the victim towards a particular form, site, or checkout
any kind of campaign based on voice technology such as a phone call
a fishing method
Vishing is a variation of phishing done using voice technology
True
False
Most social engineering attacks are based on 5 principles..
priority, legal proof, vulgarity, currency, barbarity
similarity, social proof, necessity, emergency, clarity
authority, social proof, scarcity, urgency, familiarity