Which of the following best describes: PHISHING? an act of pretending to be another person for the purpose of entertainment or deception. hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware
Social Engineering Reference Sheet
Which of the following best describes: PHISHING?
|
an act of pretending to be another person for the purpose of entertainment or deception. |
|
hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. |
|
a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware |
|
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. |
|
to trick into believing or accepting as genuine something false and often preposterous |
Which of the following best describes: HOAXES?
|
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. |
|
to trick into believing or accepting as genuine something false and often preposterous |
|
an act of pretending to be another person for the purpose of entertainment or fraud. |
|
a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware |
|
hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. |
Which of the following best describes: BAITING?
|
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. |
|
to trick into believing or accepting as genuine something false and often preposterous |
|
an act of pretending to be another person for the purpose of entertainment or fraud. |
|
a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware |
|
hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. |
Which of the following best describes: SPOOFING?
|
to trick into believing or accepting as genuine something false and often preposterous |
|
a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware |
|
an act of pretending to be another person for the purpose of entertainment or fraud. |
|
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. |
|
hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. |
Which of the following best describes: IMPERSONATION?
|
hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. |
|
an act of pretending to be another person for the purpose of entertainment or fraud. |
|
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. |
|
to trick into believing or accepting as genuine something false and often preposterous |
|
a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware |
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
Which of the following best describes: PHISHING?
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Trending now
This is a popular solution!
Step by step
Solved in 4 steps