2023 Social Engineering Red Flags Quiz Answers
Question: An email message containing warning related to a non-existent computer security threat, asking a user to delete system files falsely identified as malware, and/or prompting them to share the message with others is an example of:
Vishing
2. Impersonation
3. Virus hoax
4. Phishing
Answer: Virus hoax
Question: Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.
1. True
2. False
Answer: True
Question: A situation in which an unauthorized person can view another user’s display or keyboard to learn their password or other confidential information is referred to as:
1. Spear phishing
2. Tailgating
3. Shoulder surfing
4. Spoofing
Answer: Shoulder surfing
Question:
Answer: True
Question: Which social engineering attack relies on identity theft?
1. Impersonation
2. Dumpster diving
3. Watering hole attack
4. Shoulder surfing
Answer: Impersonation
Question: What is tailgating?
1. Acquiring unauthorized access to confidential data
2. Looking over someone’s shoulder to get information
3. Gaining unauthorized access to restricted areas by following another person
4. Manipulating a user into disclosing confidential information
Answer: Gaining unauthorized access to restricted areas by following another person
Question: The practice of using a telephone system to manipulate user into disclosing confidential information is called:
1. Whaling
2. Spear phishing
3. Vishing
4. Pharming
Answer: Vishing
Question: Phishing scams targeting people holding high positions in an organization or business are known as:
1. Vishing
2. Bluesnarfing
3. Whaling
4. Bluejacking
5. Pharming
Answer: Whaling
Question: Phishing scams targeting a specific group of people are referred to as:
1. Vishing
2. Spear phishing
3. Spoofing
4. Whaling
Answer: Spear phishing
Question: A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:
1. Phishing
2. Privilege escalation
3. Backdoor access
4. Shoulder surfing
Answer: Phishing