Social Engineering
14 community-sourced questions and answers about Social Engineering, aggregated from every CBT we've indexed that covers this topic.
Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?
Investigate the link's actual destination using the preview feature
What is TRUE of a phishing attack?
Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
Which of the following is a way to protect against social engineering?
Investigate the link's actual destination using the preview feature
What is whaling?
Investigate the link's actual destination using the preview feature
What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?
Investigate the link's actual destination using the preview feature
How can you protect yourself from internet hoaxes?
Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
Which may be a security issue with compressed Uniform Resource Locators (URLs)?
It may be compromised as soon as you exit the plane.
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
Follow instructions given only by verified personnel.
What is a common indicator of a phishing attempt?
Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
What is a common indicator of a phishing attempt? -Up-to-date security certificates -A digital signature -A claim that you must update or validate information -A request to call the number on the back of your credit card
A claim that you must update or validate information
Which of the following is true of internet hoaxes?
They can be part of a distributed denial of service (DDoS) attack.
Which of the following is true?
It may expose the connected device to malware.
What security issue is associated with compressed Uniform Resource Locators (URLs)?
They may be used to mask malicious intent.
What type of social engineering targets particular groups of people? -School phising -Whaling -Group phishing -Spear phishing
Spear phishing