254 Chapter 10 ■ Social Engineering
Review Questions
- Phishing takes place using.
A. Instant messaging
B. E-mail
C. Websites
D. Piggybacking - Training and education of end users can be used to prevent.
A. Phishing
B. Tailgating/piggybacking
C. Session hijacking
D. Wireshark - Social engineering can be thwarted using what kinds of controls?
A. Tech n ica l
B. Administrative
C. Physical
D. Common sense - Social engineering preys on many weaknesses, including.
A. Technology
B. People
C. Human nature
D. Physical - Social engineering can use all the following except.
A. Mobile phones
B. Instant messaging
C. Trojan horses
D. Viruses - Social engineering is designed to.
A. Manipulate human behavior
B. Make people distrustful
C. Negotiate to yes
D. Gain a physical advantage