All of the following are techniques used by a social engineer EXCEPT:
A) An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.
B) An attacker calls up the IT department posing as an employee and requests a password reset.
C) An attacker runs a brute force attack on a password.
D) An attacker sends a forged e-mail with a link to a bogus web site that has been set to obtain personal information.
Correct Answer:
Verified
Q11: All of the following are characteristics of
Q12: When an attacker attempts to get credit
Q13: The only means of social engineering is
Q14: Which of the following is the
Q15: Phishing is the most common form of
Q17: Users on your network receive an e-mail
Q18: A person parks his car by an
Q19: When and attacker tries to convince the
Q20: Social engineers attempt to exploit the natural
Q21: The process of convincing an authorized individual
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents