CEH

(Jeff_L) #1

Review Questions 257



  1. An attacker can use which technique to influence a victim?


A. Tailgating
B. Piggybacking
C. Name-dropping
D. Tech suppor t


  1. Jason receives notices that he is receiving mail, phone calls, and other requests for
    information. Additionally he has also noticed some problems with his credit checks such
    as bad debts and loans he did not participate in. What type of attack did Jason become a
    victim of?
    A. Social engineering
    B. Phishing
    C. Identity theft
    D. Bad luck

Free download pdf