CEH

(Jeff_L) #1

254 Chapter 10 ■ Social Engineering


Review Questions



  1. Phishing takes place using.
    A. Instant messaging
    B. E-mail
    C. Websites
    D. Piggybacking

  2. Training and education of end users can be used to prevent.
    A. Phishing
    B. Tailgating/piggybacking
    C. Session hijacking
    D. Wireshark

  3. Social engineering can be thwarted using what kinds of controls?
    A. Tech n ica l
    B. Administrative
    C. Physical
    D. Common sense

  4. Social engineering preys on many weaknesses, including.
    A. Technology
    B. People
    C. Human nature
    D. Physical

  5. Social engineering can use all the following except.
    A. Mobile phones
    B. Instant messaging
    C. Trojan horses
    D. Viruses

  6. Social engineering is designed to.
    A. Manipulate human behavior
    B. Make people distrustful
    C. Negotiate to yes
    D. Gain a physical advantage

Free download pdf