Topic Deep DiveAcross 4 CBTs

Social Engineering

14 community-sourced questions and answers about Social Engineering, aggregated from every CBT we've indexed that covers this topic.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?

ANSWER

Investigate the link's actual destination using the preview feature

QUESTION 2

What is TRUE of a phishing attack?

ANSWER

Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

QUESTION 3

Which of the following is a way to protect against social engineering?

ANSWER

Investigate the link's actual destination using the preview feature

QUESTION 4

What is whaling?

ANSWER

Investigate the link's actual destination using the preview feature

QUESTION 5

What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?

ANSWER

Investigate the link's actual destination using the preview feature

QUESTION 6

How can you protect yourself from internet hoaxes?

ANSWER

Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

QUESTION 7

Which may be a security issue with compressed Uniform Resource Locators (URLs)?

ANSWER

It may be compromised as soon as you exit the plane.

QUESTION 8

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

ANSWER

Follow instructions given only by verified personnel.

QUESTION 9

What is a common indicator of a phishing attempt?

ANSWER

Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

QUESTION 10

What is a common indicator of a phishing attempt? -Up-to-date security certificates -A digital signature -A claim that you must update or validate information -A request to call the number on the back of your credit card

ANSWER

A claim that you must update or validate information

QUESTION 11

Which of the following is true of internet hoaxes?

ANSWER

They can be part of a distributed denial of service (DDoS) attack.

QUESTION 12

Which of the following is true?

ANSWER

It may expose the connected device to malware.

QUESTION 13

What security issue is associated with compressed Uniform Resource Locators (URLs)?

ANSWER

They may be used to mask malicious intent.

QUESTION 14

What type of social engineering targets particular groups of people? -School phising -Whaling -Group phishing -Spear phishing

ANSWER

Spear phishing