Social engineering — users are the weakest link
Social engineering in the IT context is...
a term used to describe technology derived from AI
a term referring to IT engineers working for a social purpose
a term used for various malicious activities made through human interactions
What is NOT considered sensitive data?
health-related data
IP numer
political opinions
Locating sensitive and important data in one place is a good idea.
True
False
Raising awareness about technical engineering is crucial
True
False
Phishing, the most popular social engineering technique, is...
any kind of campaign based on voice technology such as a phone call
any kind of messaging campaign planned to redirect the victim towards a particular form, site, or checkout
a fishing method
Vishing is a variation of phishing done using voice technology
False
True
Most social engineering attacks are based on 5 principles..
similarity, social proof, necessity, emergency, clarity
authority, social proof, scarcity, urgency, familiarity
priority, legal proof, vulgarity, currency, barbarity