100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SOPHOS CERTIFIED ENGINEER EXAM 2026 PRACTICE QUESTION SET TWO

Rating
-
Sold
-
Pages
81
Grade
A+
Uploaded on
09-01-2026
Written in
2025/2026

SOPHOS CERTIFIED ENGINEER EXAM 2026 PRACTICE QUESTION SET TWO

Institution
SOPHOS CERTIFIED ENGINEER
Course
SOPHOS CERTIFIED ENGINEER











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SOPHOS CERTIFIED ENGINEER
Course
SOPHOS CERTIFIED ENGINEER

Document information

Uploaded on
January 9, 2026
Number of pages
81
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SOPHOS CERTIFIED ENGINEER EXAM 2026
PRACTICE QUESTION SET TWO

◉ Smishing. Answer: When someone tries to trick you into giving
them your private information via a text or SMS message.


◉ Vishing. Answer: Using social engineering over the telephone
system to gain access to private personal and financial information
for the purpose of financial reward


◉ Spam. Answer: irrelevant or unsolicited messages sent to a large
number of Internet users, for illegitimate advertising, and other
activities such as phishing, and spreading malware


◉ SPIM. Answer: Spam delivered through instant messaging (IM)
instead of through e-mail messaging


◉ Spear Phishing. Answer: the act of sending emails to specific and
well-researched targets while pretending to be a trusted sender


◉ Dumpster Diving. Answer: exploration of a system's trash bin for
the purpose of finding details in order for a hacker to have a
successful online assault.

,◉ Shoulder Surfing. Answer: When someone watches over your
shoulder to nab valuable information as you key it into an electronic
device.


◉ Pharming. Answer: cyberattack intended to redirect a website's
traffic to another, fake site.


◉ Tailgating. Answer: Social engineering attempt by cyber threat
actors in which they trick employees into helping them gain
unauthorized access into the company premises.


◉ Eliciting Information. Answer: Procedures or techniques involving
interacting with and communicating with others that is designed to
gather knowledge or inform


◉ Whaling. Answer: Spear phishing that focuses on one specific high
level executive or influencer


◉ Prepending. Answer: Prepend is a word that means to attach
content as a prefix. For example, a prepend command could be used
in a scripting language that a programmer would enter into a certain
function or code module. It would add certain characters of text to
the beginning of some variable or object.

,◉ Identity Fraud. Answer: identity fraud is the use of stolen
information such as making fake ID's and fake bank accounts


◉ Invoice Scams. Answer: using fraudulent invoices to steal from a
company


◉ Credential Harvesting. Answer: the use of MITM attacks, DNS
poisoning, phishing, etc. to amass large numbers of credentials
(username / password combinations) for reuse.


◉ Reconnaissance. Answer: - Information gathering about a target
network


◉ Hoax. Answer: Cyber hoax scams are attacks that exploit
unsuspecting users to provide valuable information, such as login
credentials or money.


◉ Impersonation. Answer: typically involves an email that seems to
come from a trusted source.


◉ Watering hole attack. Answer: security exploit in which the
attacker seeks to compromise a specific group of end users by
infecting websites that members of the group are known to visit. The
goal is to infect a targeted user's computer and gain access to the
network at the target's place of employment.

, ◉ Typo squatting. Answer: type of cybersquatting used by imposters
that involve registering domains with intentionally misspelled
names of popular web addresses to install malware on the user's
system


◉ Pretexting. Answer: the practice of presenting oneself as someone
else in order to obtain private information.


◉ Influence campaigns. Answer:


◉ Hybrid warfare. Answer: - Combining conventional warfare with
cyberwarfare


◉ Social Media Campaign. Answer: Planned, coordinated marketing
efforts using one or more social media platforms.


◉ Principles:. Answer: Authority: an attacker may try to appear to
have a certain level authority.
Intimidation: may try to make the victim think that something
terrible is going to happen if they don't comply with the attacker's
wishes.
Consensus: An attacker may try to sway the mind of a victim using
names they are familiar with, saying that such ones provided them

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
FocusFile7 Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
44
Member since
7 months
Number of followers
2
Documents
21560
Last sold
2 days ago
FocusFile7

Welcome to FocusFile, your inspiring hub for academic excellence! Just like your favorite café where every sip brings comfort, FocusFile is designed to be your go-to space for clear thinking, deep focus, and study success. Here at FocusFile, I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top-notch, easy-to-digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, FocusFile has you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner whether you're a visual thinker, a bullet-point lover, or someone who thrives on quick, impactful insights. Think of FocusFile as your academic sanctuary, a place where productivity meets peace of mind. So grab your favorite drink, settle in, and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making FocusFile your study partner. Let’s unlock your full potential together!

Read more Read less
4.3

4 reviews

5
2
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions