2023 Social Engineering Red Flags Quiz Answers

Question: An email message containing warning related to a non-existent computer security threat, asking a user to delete system files falsely identified as malware, and/or prompting them to share the message with others is an example of:

  1. Vishing

  2. 2. Impersonation

  3. 3. Virus hoax

  4. 4. Phishing

  5. Answer: Virus hoax

  6. Question: Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.

  7. 1. True

  8. 2. False

  9. Answer: True

  10. Question: A situation in which an unauthorized person can view another user’s display or keyboard to learn their password or other confidential information is referred to as:

  11. 1. Spear phishing

  12. 2. Tailgating

  13. 3. Shoulder surfing

  14. 4. Spoofing

  15. Answer: Shoulder surfing

  16. Question:

  17. Answer: True

  18. Question: Which social engineering attack relies on identity theft?

  19. 1. Impersonation

  20. 2. Dumpster diving

  21. 3. Watering hole attack

  22. 4. Shoulder surfing

  23. Answer: Impersonation

  24. Question: What is tailgating?

  25. 1. Acquiring unauthorized access to confidential data

  26. 2. Looking over someone’s shoulder to get information

  27. 3. Gaining unauthorized access to restricted areas by following another person

  28. 4. Manipulating a user into disclosing confidential information

  29. Answer: Gaining unauthorized access to restricted areas by following another person

  30. Question: The practice of using a telephone system to manipulate user into disclosing confidential information is called:

  31. 1. Whaling

  32. 2. Spear phishing

  33. 3. Vishing

  34. 4. Pharming

  35. Answer: Vishing

  36. Question: Phishing scams targeting people holding high positions in an organization or business are known as:

  37. 1. Vishing

  38. 2. Bluesnarfing

  39. 3. Whaling

  40. 4. Bluejacking

  41. 5. Pharming

  42. Answer: Whaling

  43. Question: Phishing scams targeting a specific group of people are referred to as:

  44. 1. Vishing

  45. 2. Spear phishing

  46. 3. Spoofing

  47. 4. Whaling

  48. Answer: Spear phishing

  49. Question: A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

  50. 1. Phishing

  51. 2. Privilege escalation

  52. 3. Backdoor access

  53. 4. Shoulder surfing

  54. Answer: Phishing

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.