1, Would this incident be an example of social engineering? You receive a phone
ID: 669741 • Letter: 1
Question
1, Would this incident be an example of social engineering?
You receive a phone call from the technical support department of a software maker alerting you to a bug in the company’s software, which you have purchased. The tech offers to walk you through the steps required to fix the software on your computer.
Social engineering
Not social engineering
2,Would this incident be an example of social engineering?
You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.
Social engineering
Not social engineering
3, Can the following action be a result of your PII being compromised?
Being denied access to your own bank account online
Yes
No
4, Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.
Deleting the attachment in an unexpected e-mail
Phishing victim
Not a phishing victim
5, Can the following action be a result of your PII being compromised?
Having your identity stolen
Yes
No
6, Would this incident be an example of social engineering?
You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.
Social engineering
Not social engineering
Explanation / Answer
1. Not social engineering
Explanation: social engineering is method to hack system by using their behaviour or social network.
2. social engineering
Explanation: He may use that number for hacking something
3. Yes
Explanation: If hacker gained access to you bank account then he can change passwords.
4. Not a phishing victim
Explanation: Deleting will not let the malware run hence system will not be affected by the malware
5. Yes
Explanation: Hacker may use personal identity to hack your account
6. Social engineering
Explanation: Yes he may use that email to hack his account .
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.