Which of the following is a social engineering attack method?
A.
An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.
B.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
C.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
D.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
The Answer Is:
B
This question includes an explanation.
Explanation:
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone. This is a social engineering attack method that exploits the trust or curiosity of the employee to obtain sensitive information that can be used to access or compromise the network. According to the web search results, social engineering is a technique that uses psychological manipulationto trick users into making security mistakes or giving away sensitive information1. Phishing, whaling, baiting, and pretexting are some of the common forms of social engineering attacks2. Social engineering attacks are often more effective and profitable than purely technical attacks, as they rely on human error rather than system vulnerabilities
CISA PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"