Which of the follow...
 
Notifications
Clear all

Which of the following is a social engineering attack method?

1 Posts
1 Users
0 Likes
55 Views
 Theo
(@baintheo)
Posts: 705
Noble Member
Topic starter
 

Which of the following is a social engineering attack method?

  • A . An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.
    B. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
    C. A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
    D. An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Show Answer Hide Answer

Suggested Answer: B
 
Posted : 25/12/2022 7:20 am

Latest ISACA CISA Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: