Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1, Would this incident be an example of social engineering? You receive a phone

ID: 669741 • Letter: 1

Question

1, Would this incident be an example of social engineering?

You receive a phone call from the technical support department of a software maker alerting you to a bug in the company’s software, which you have purchased. The tech offers to walk you through the steps required to fix the software on your computer.

Social engineering

Not social engineering

2,Would this incident be an example of social engineering?

You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.

Social engineering

Not social engineering

3, Can the following action be a result of your PII being compromised?

Being denied access to your own bank account online

Yes

No

4, Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.

Deleting the attachment in an unexpected e-mail

Phishing victim

Not a phishing victim

5, Can the following action be a result of your PII being compromised?

Having your identity stolen

Yes

No

6, Would this incident be an example of social engineering?

You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.

Social engineering

Not social engineering

Explanation / Answer

1. Not social engineering
Explanation: social engineering is method to hack system by using their behaviour or social network.

2. social engineering
   Explanation: He may use that number for hacking something

3. Yes
Explanation: If hacker gained access to you bank account then he can change passwords.

4. Not a phishing victim
   Explanation: Deleting will not let the malware run hence system will not be affected by the malware

5. Yes
   Explanation: Hacker may use personal identity to hack your account

6. Social engineering
   Explanation: Yes he may use that email to hack his account .