ExamGecko
Question list
Search
Search

Related questions

Question 151 - CISA discussion

Report
Export

Which of the following is a social engineering attack method?

A.
An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.
Answers
A.
An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.
B.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
Answers
B.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
C.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
Answers
C.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
D.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
Answers
D.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
Suggested answer: B

Explanation:

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone. This is a social engineering attack method that exploits the trust or curiosity of the employee to obtain sensitive information that can be used to access or compromise the network.According to the web search results, social engineering is a technique that uses psychological manipulation to trick users into making security mistakes or giving away sensitive information1.Phishing, whaling, baiting, and pretexting are some of the common forms of social engineering attacks2.Social engineering attacks are often more effective and profitable than purely technical attacks, as they rely on human error rather than system vulnerabilities

asked 18/09/2024
Praveen Achankunju
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first