Social engineering — users are the weakest link
Social engineering in the IT context is...
a term used to describe technology derived from AI
a term referring to IT engineers working for a social purpose
a term used for various malicious activities made through human interactions
What is NOT considered sensitive data?
political opinions
health-related data
IP numer
Locating sensitive and important data in one place is a good idea.
False
True
Raising awareness about technical engineering is crucial
False
True
Phishing, the most popular social engineering technique, is...
any kind of campaign based on voice technology such as a phone call
a fishing method
any kind of messaging campaign planned to redirect the victim towards a particular form, site, or checkout
Vishing is a variation of phishing done using voice technology
False
True
Most social engineering attacks are based on 5 principles..
authority, social proof, scarcity, urgency, familiarity
priority, legal proof, vulgarity, currency, barbarity
similarity, social proof, necessity, emergency, clarity