Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- The purpose of social engineering is __________.
- To create distrust with people
- To take advantage of human behavior
- Piggybacking
- Instant messaging
- Phishing takes place using which of the following?
- Websites
- Piggybacking
- Instant messaging
- How can you best avoid a social engineering attack?
- By hiring additional helpdesk/support staff
- To avoid scanning, install or upgrade a firewall
- Employee training
- An IDS logs review
- Factors that can predispose a business to social engineering attacks are all of the following except for which one?
- Inadequate security policies
- Multiple locations
- Frequent, ongoing security education
- Unrestricted information access