Review Questions 255
- Phishing can be mitigated through the use of.
A. Spam filtering
B. Education
C. Antivirus
D. Anti-malware
- Which mechanism can be used to influence individuals?
A. Means of dress or appearance
B. Technological controls
C. Physical controls
D. Training
- Jennifer receives an e-mail claiming that her bank account information has been lost and
that she needs to click a link to update the bank’s database. However, she doesn’t recognize
the bank, because it is not one she does business with. What type of attack is she being
presented with?
A. Phishing
B. Spam
C. Whaling
D. Vishing - What is the best option for thwarting social-engineering attacks?
A. Technology
B. Training
C. Policies
D. Physical controls
- Janet receives an e-mail enticing her to click a link and provide her account information and
Social Security number. What type of attack is this?
A. Whaling
B. Vishing
C. Phishing
D. Piggybacking - Jason receives notices that he has unauthorized charges on his credit card account. What
type of attack is Jason a victim of?
A. Social engineering
B. Phishing
C. Identity theft
D. Bad luck