100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

SOPHOS CERTIFIED ENGINEER EXAM 2026 PRACTICE QUESTION SET TWO

Puntuación
-
Vendido
-
Páginas
81
Grado
A+
Subido en
09-01-2026
Escrito en
2025/2026

SOPHOS CERTIFIED ENGINEER EXAM 2026 PRACTICE QUESTION SET TWO

Institución
SOPHOS CERTIFIED ENGINEER
Grado
SOPHOS CERTIFIED ENGINEER











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
SOPHOS CERTIFIED ENGINEER
Grado
SOPHOS CERTIFIED ENGINEER

Información del documento

Subido en
9 de enero de 2026
Número de páginas
81
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SOPHOS CERTIFIED ENGINEER EXAM 2026
PRACTICE QUESTION SET TWO

◉ Smishing. Answer: When someone tries to trick you into giving
them your private information via a text or SMS message.


◉ Vishing. Answer: Using social engineering over the telephone
system to gain access to private personal and financial information
for the purpose of financial reward


◉ Spam. Answer: irrelevant or unsolicited messages sent to a large
number of Internet users, for illegitimate advertising, and other
activities such as phishing, and spreading malware


◉ SPIM. Answer: Spam delivered through instant messaging (IM)
instead of through e-mail messaging


◉ Spear Phishing. Answer: the act of sending emails to specific and
well-researched targets while pretending to be a trusted sender


◉ Dumpster Diving. Answer: exploration of a system's trash bin for
the purpose of finding details in order for a hacker to have a
successful online assault.

,◉ Shoulder Surfing. Answer: When someone watches over your
shoulder to nab valuable information as you key it into an electronic
device.


◉ Pharming. Answer: cyberattack intended to redirect a website's
traffic to another, fake site.


◉ Tailgating. Answer: Social engineering attempt by cyber threat
actors in which they trick employees into helping them gain
unauthorized access into the company premises.


◉ Eliciting Information. Answer: Procedures or techniques involving
interacting with and communicating with others that is designed to
gather knowledge or inform


◉ Whaling. Answer: Spear phishing that focuses on one specific high
level executive or influencer


◉ Prepending. Answer: Prepend is a word that means to attach
content as a prefix. For example, a prepend command could be used
in a scripting language that a programmer would enter into a certain
function or code module. It would add certain characters of text to
the beginning of some variable or object.

,◉ Identity Fraud. Answer: identity fraud is the use of stolen
information such as making fake ID's and fake bank accounts


◉ Invoice Scams. Answer: using fraudulent invoices to steal from a
company


◉ Credential Harvesting. Answer: the use of MITM attacks, DNS
poisoning, phishing, etc. to amass large numbers of credentials
(username / password combinations) for reuse.


◉ Reconnaissance. Answer: - Information gathering about a target
network


◉ Hoax. Answer: Cyber hoax scams are attacks that exploit
unsuspecting users to provide valuable information, such as login
credentials or money.


◉ Impersonation. Answer: typically involves an email that seems to
come from a trusted source.


◉ Watering hole attack. Answer: security exploit in which the
attacker seeks to compromise a specific group of end users by
infecting websites that members of the group are known to visit. The
goal is to infect a targeted user's computer and gain access to the
network at the target's place of employment.

, ◉ Typo squatting. Answer: type of cybersquatting used by imposters
that involve registering domains with intentionally misspelled
names of popular web addresses to install malware on the user's
system


◉ Pretexting. Answer: the practice of presenting oneself as someone
else in order to obtain private information.


◉ Influence campaigns. Answer:


◉ Hybrid warfare. Answer: - Combining conventional warfare with
cyberwarfare


◉ Social Media Campaign. Answer: Planned, coordinated marketing
efforts using one or more social media platforms.


◉ Principles:. Answer: Authority: an attacker may try to appear to
have a certain level authority.
Intimidation: may try to make the victim think that something
terrible is going to happen if they don't comply with the attacker's
wishes.
Consensus: An attacker may try to sway the mind of a victim using
names they are familiar with, saying that such ones provided them
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
FocusFile7 Harvard University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
44
Miembro desde
7 meses
Número de seguidores
2
Documentos
21560
Última venta
2 días hace
FocusFile7

Welcome to FocusFile, your inspiring hub for academic excellence! Just like your favorite café where every sip brings comfort, FocusFile is designed to be your go-to space for clear thinking, deep focus, and study success. Here at FocusFile, I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top-notch, easy-to-digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, FocusFile has you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner whether you're a visual thinker, a bullet-point lover, or someone who thrives on quick, impactful insights. Think of FocusFile as your academic sanctuary, a place where productivity meets peace of mind. So grab your favorite drink, settle in, and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making FocusFile your study partner. Let’s unlock your full potential together!

Lee mas Leer menos
4.3

4 reseñas

5
2
4
1
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes