Home
You may like this!
46.
Phishing takes place using __________.
  • A.
    Instant messaging
  • B.
    Email
  • C.
    Websites
  • D.
    Piggybacking
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Phishing is performed using email to entice the target to provide information of a sensitive nature.
Report
Name Email  
47.
Training and education of end users can be used to prevent __________.
  • A.
    Phishing
  • B.
    Tailgating/piggybacking
  • C.
    Session hijacking
  • D.
    Wireshark
  • Answer & Explanation
  • Report
Answer : [A, B]
Explanation :
Training and education are specifically used to prevent the practice of tailgating or piggybacking. Attacks such as session hijacking can’t be prevented through training and education of end users.
Report
Name Email  
48.
Social engineering can be thwarted using what kinds of controls?
  • A.
    Technical
  • B.
    Administrative
  • C.
    Physical
  • D.
    Proactive controls
  • Answer & Explanation
  • Report
Answer : [A, B, C]
Explanation :
Technology alone cannot stop the impact of social engineering and must be accompanied by other mechanisms as well, such as education. The strongest defense against social engineering tends to be proper training and education.
Report
Name Email  
49.
Social engineering preys on many weaknesses, including __________.
  • A.
    Technology
  • B.
    People
  • C.
    Human nature
  • D.
    Physical
  • Answer & Explanation
  • Report
Answer : [A, B, C, D]
Explanation :
The targets of social engineering are people and the weaknesses present in human beings.
Report
Name Email  
50.
Social engineering can use all the following except __________.
  • A.
    Mobile phones
  • B.
    Instant messaging
  • C.
    Trojan horses
  • D.
    Viruses
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Social engineering takes advantage of many mechanisms, including Trojan horses, but it does not use viruses. However, instant messaging, mobile phones, and Trojan horses are all effective tools for social engineering.
Report
Name Email