Social engineering — users are the weakest link
Social engineering in the IT context is...
a term used to describe technology derived from AI
a term used for various malicious activities made through human interactions
a term referring to IT engineers working for a social purpose
What is NOT considered sensitive data?
IP numer
political opinions
health-related data
Locating sensitive and important data in one place is a good idea.
False
True
Raising awareness about technical engineering is crucial
False
True
Phishing, the most popular social engineering technique, is...
a fishing method
any kind of messaging campaign planned to redirect the victim towards a particular form, site, or checkout
any kind of campaign based on voice technology such as a phone call
Vishing is a variation of phishing done using voice technology
True
False
Most social engineering attacks are based on 5 principles..
similarity, social proof, necessity, emergency, clarity
authority, social proof, scarcity, urgency, familiarity
priority, legal proof, vulgarity, currency, barbarity