Social engineering — users are the weakest link
Social engineering in the IT context is...
a term used to describe technology derived from AI
a term used for various malicious activities made through human interactions
a term referring to IT engineers working for a social purpose
What is NOT considered sensitive data?
IP numer
political opinions
health-related data
Locating sensitive and important data in one place is a good idea.
False
True
Raising awareness about technical engineering is crucial
False
True
Phishing, the most popular social engineering technique, is...
any kind of campaign based on voice technology such as a phone call
any kind of messaging campaign planned to redirect the victim towards a particular form, site, or checkout
a fishing method
Vishing is a variation of phishing done using voice technology
True
False
Most social engineering attacks are based on 5 principles..
similarity, social proof, necessity, emergency, clarity
authority, social proof, scarcity, urgency, familiarity
priority, legal proof, vulgarity, currency, barbarity