University

Image

social engineering attacks

23
plays

5 questions

Show Answers
See Preview
  • 1. Multiple Choice
    2 minutes
    1 pt
    When The attacker compromises the network or system through social interaction with an individual. This is an example of what?
    Social Engineering Attack
    Network Attack
    Spoof Attack
    Sniffer
  • 2. Multiple Choice
    2 minutes
    1 pt
    All of the following are part of Social Engineering attacks EXCEPT which one?
    Hacker impersonates an Administrator
    Hacker impersonates a User
    Phishing Attack
    Spoof Attack
  • 3. Multiple Choice
    2 minutes
    1 pt
    Which Network attack is also known as packet sniffing?
    Eavesdropping
    Spoof
    Hijack
    Password
  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?