Social engineering — users are the weakest link
Social engineering in the IT context is...
a term used to describe technology derived from AI
a term referring to IT engineers working for a social purpose
a term used for various malicious activities made through human interactions
What is NOT considered sensitive data?
IP numer
political opinions
health-related data
Locating sensitive and important data in one place is a good idea.
True
False
Raising awareness about technical engineering is crucial
True
False
Phishing, the most popular social engineering technique, is...
any kind of campaign based on voice technology such as a phone call
a fishing method
any kind of messaging campaign planned to redirect the victim towards a particular form, site, or checkout
Vishing is a variation of phishing done using voice technology
True
False
Most social engineering attacks are based on 5 principles..
authority, social proof, scarcity, urgency, familiarity
similarity, social proof, necessity, emergency, clarity
priority, legal proof, vulgarity, currency, barbarity