Reference no: EM133421029
Questions
1. ______ is a distinct kind of attack that hackers use to take advantage of human psychology.
2. Which one of the following does not fall under the category of social engineering?
3. _________ involves scams in which a person, typically an attacker, tells a lie to a person, usually the target victim, in order to obtain privilege data.
4. Which of the following methods is used to find information in or around a dustbin or trash can?
5. Which one of the following does not constitute social engineering?
6. In phishing, intruders aim to social engineer victims using ________ technology.
7. Eight is another name for tailgating. Hospitals, banks, private businesses, and non-profit organizations all prohibit physical hacking.
9. An illustration of a lack of ______ security is stealing DVDs and pen drives after a tailgating event.
10. ________ is an individual's ability to physically enter a restricted area.