The following are some questions based on the topics we have covered in this chapter:
- What is it called when an unauthorized person is listening to a conversation between two parties?
- A user has received an email that seems to be from their local bank. On opening the email, the user finds a URL that says they should click the link to reset their password. What type of attack is this?
- A user has received an SMS message with a URL on their phone, supposedly from a legitimate bank. When the user clicks the link, a website appears, asking the user to log in. When the user logs in with their credentials, they are redirected to their official bank's website. What type of attack is this?
- What social engineering tools are available in Kali Linux?