100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SOPHOS CERTIFIED ENGINEER EXAM 2026 PRACTICE QUESTION SET TWO

Beoordeling
-
Verkocht
-
Pagina's
81
Cijfer
A+
Geüpload op
09-01-2026
Geschreven in
2025/2026

SOPHOS CERTIFIED ENGINEER EXAM 2026 PRACTICE QUESTION SET TWO

Instelling
SOPHOS CERTIFIED ENGINEER
Vak
SOPHOS CERTIFIED ENGINEER











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
SOPHOS CERTIFIED ENGINEER
Vak
SOPHOS CERTIFIED ENGINEER

Documentinformatie

Geüpload op
9 januari 2026
Aantal pagina's
81
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

SOPHOS CERTIFIED ENGINEER EXAM 2026
PRACTICE QUESTION SET TWO

◉ Smishing. Answer: When someone tries to trick you into giving
them your private information via a text or SMS message.


◉ Vishing. Answer: Using social engineering over the telephone
system to gain access to private personal and financial information
for the purpose of financial reward


◉ Spam. Answer: irrelevant or unsolicited messages sent to a large
number of Internet users, for illegitimate advertising, and other
activities such as phishing, and spreading malware


◉ SPIM. Answer: Spam delivered through instant messaging (IM)
instead of through e-mail messaging


◉ Spear Phishing. Answer: the act of sending emails to specific and
well-researched targets while pretending to be a trusted sender


◉ Dumpster Diving. Answer: exploration of a system's trash bin for
the purpose of finding details in order for a hacker to have a
successful online assault.

,◉ Shoulder Surfing. Answer: When someone watches over your
shoulder to nab valuable information as you key it into an electronic
device.


◉ Pharming. Answer: cyberattack intended to redirect a website's
traffic to another, fake site.


◉ Tailgating. Answer: Social engineering attempt by cyber threat
actors in which they trick employees into helping them gain
unauthorized access into the company premises.


◉ Eliciting Information. Answer: Procedures or techniques involving
interacting with and communicating with others that is designed to
gather knowledge or inform


◉ Whaling. Answer: Spear phishing that focuses on one specific high
level executive or influencer


◉ Prepending. Answer: Prepend is a word that means to attach
content as a prefix. For example, a prepend command could be used
in a scripting language that a programmer would enter into a certain
function or code module. It would add certain characters of text to
the beginning of some variable or object.

,◉ Identity Fraud. Answer: identity fraud is the use of stolen
information such as making fake ID's and fake bank accounts


◉ Invoice Scams. Answer: using fraudulent invoices to steal from a
company


◉ Credential Harvesting. Answer: the use of MITM attacks, DNS
poisoning, phishing, etc. to amass large numbers of credentials
(username / password combinations) for reuse.


◉ Reconnaissance. Answer: - Information gathering about a target
network


◉ Hoax. Answer: Cyber hoax scams are attacks that exploit
unsuspecting users to provide valuable information, such as login
credentials or money.


◉ Impersonation. Answer: typically involves an email that seems to
come from a trusted source.


◉ Watering hole attack. Answer: security exploit in which the
attacker seeks to compromise a specific group of end users by
infecting websites that members of the group are known to visit. The
goal is to infect a targeted user's computer and gain access to the
network at the target's place of employment.

, ◉ Typo squatting. Answer: type of cybersquatting used by imposters
that involve registering domains with intentionally misspelled
names of popular web addresses to install malware on the user's
system


◉ Pretexting. Answer: the practice of presenting oneself as someone
else in order to obtain private information.


◉ Influence campaigns. Answer:


◉ Hybrid warfare. Answer: - Combining conventional warfare with
cyberwarfare


◉ Social Media Campaign. Answer: Planned, coordinated marketing
efforts using one or more social media platforms.


◉ Principles:. Answer: Authority: an attacker may try to appear to
have a certain level authority.
Intimidation: may try to make the victim think that something
terrible is going to happen if they don't comply with the attacker's
wishes.
Consensus: An attacker may try to sway the mind of a victim using
names they are familiar with, saying that such ones provided them

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
FocusFile7 Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
44
Lid sinds
7 maanden
Aantal volgers
2
Documenten
21560
Laatst verkocht
2 dagen geleden
FocusFile7

Welcome to FocusFile, your inspiring hub for academic excellence! Just like your favorite café where every sip brings comfort, FocusFile is designed to be your go-to space for clear thinking, deep focus, and study success. Here at FocusFile, I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top-notch, easy-to-digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, FocusFile has you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner whether you're a visual thinker, a bullet-point lover, or someone who thrives on quick, impactful insights. Think of FocusFile as your academic sanctuary, a place where productivity meets peace of mind. So grab your favorite drink, settle in, and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making FocusFile your study partner. Let’s unlock your full potential together!

Lees meer Lees minder
4,3

4 beoordelingen

5
2
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen