The art of manipulating, influencing, or deceiving you into taking some action
that isn't in your own best interest or in the best interest of your organization
is________. - ANSWER Social Engineering
Which of the following is not an example of a red flag that would keep you
from downloading an attachment? - ANSWER The sender is from outside
your company.
A key tactic that is used in many attacks, but very frequently in CEO Fraud, is
creating a sense of what? - ANSWER Urgency
The type of attack that involves the hacker doing some research about you to
make the email more convincing and personalized is called_______. -
ANSWER Spear Phishing
Many people used to rotate through a set of passwords that they changed every
90 days. What is the number one reason not to do this anymore? - ANSWER
Passwords have been leaked as part of data breaches and your password (or a
variation of it) might already be out there for hackers to see.
What is the most likely to be a possible physical attack? - ANSWER A street
musician is offering free USBs of his music outside your office.
Social Engineering is the art of what three things? - ANSWER Manipulating,
Influencing, and Deceiving
Tailgating is an example of what type of attack? - ANSWER In-Person
Hackers know that most attacks require you to do this for them to work: -
ANSWER Take an action
that isn't in your own best interest or in the best interest of your organization
is________. - ANSWER Social Engineering
Which of the following is not an example of a red flag that would keep you
from downloading an attachment? - ANSWER The sender is from outside
your company.
A key tactic that is used in many attacks, but very frequently in CEO Fraud, is
creating a sense of what? - ANSWER Urgency
The type of attack that involves the hacker doing some research about you to
make the email more convincing and personalized is called_______. -
ANSWER Spear Phishing
Many people used to rotate through a set of passwords that they changed every
90 days. What is the number one reason not to do this anymore? - ANSWER
Passwords have been leaked as part of data breaches and your password (or a
variation of it) might already be out there for hackers to see.
What is the most likely to be a possible physical attack? - ANSWER A street
musician is offering free USBs of his music outside your office.
Social Engineering is the art of what three things? - ANSWER Manipulating,
Influencing, and Deceiving
Tailgating is an example of what type of attack? - ANSWER In-Person
Hackers know that most attacks require you to do this for them to work: -
ANSWER Take an action