Which of the following is a social engineering attack method?
A.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
B.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
C.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
D.
An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
The Answer Is:
A
This question includes an explanation.
Explanation:
Social engineering is a technique that exploits human weaknesses, such as trust, curiosity, or greed, to obtain information or access from a target. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone is an example of a social engineering attack method, as it involves manipulating the employee into divulging sensitive information that can be used to compromise the network or system. A hacker walks around an office building using scanning tools to search for a wireless network to gain access, an intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties, and an unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door are not examples of social engineering attack methods, as they do not involve human interaction or deception. References: [ISACA CISA Review Manual 27th Edition], page 361.
CISA PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"