ExamGecko
Question list
Search
Search

Related questions











Question 257 - CISA discussion

Report
Export

Which of the following is a social engineering attack method?

A.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
Answers
A.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
B.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
Answers
B.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
C.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
Answers
C.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
D.
An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
Answers
D.
An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
Suggested answer: A

Explanation:

Social engineering is a technique that exploits human weaknesses, such as trust, curiosity, or greed, to obtain information or access from a target. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone is an example of a social engineering attack method, as it involves manipulating the employee into divulging sensitive information that can be used to compromise the network or system. A hacker walks around an office building using scanning tools to search for a wireless network to gain access, an intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties, and an unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door are not examples of social engineering attack methods, as they do not involve human interaction or deception.Reference:[ISACA CISA Review Manual 27th Edition], page 361.

asked 18/09/2024
Aiko Abrassart
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first