Saturday , December 21 2024
Breaking News

Fortinet Social Engineering Quiz Answers

Module 3: Social Engineering Quiz Answers

Which attack vector does an influence campaign rely upon?

  • Zero-trust software exploit
  • Social media
  • Messaging service
  • Email

Which description best explains pharming?

  • Recruiting employees through various means to carry out an insider attack
  • Exploiting an unknown vulnerability in computer software
  • Cultivating trust between a bad actor and the target through chance encounters
  • Computer traffic redirected from a legitimate website to a malicious one

What type of insider threat is an individual who believes they are exempt from their organization’s security policies and bypasses them?

  • Lone wolf
  • Collaborator
  • Pawn
  • Goof

Which threat indicator could be an indication of an active insider threat?

  • An employee shows contempt for an organization’s policies
  • An open pot of honey is suspiciously left on a kitchen countertop
  • A USB drive is found abandoned in an organization’s parking lot
  • Two employees disagree on the interpretation of a security policy

Which two insider types are considered malicious insider threats? (Choose two.)

  • Rats
  • Pawns
  • Lone wolves
  • Moles

Which definition best describes insider threat?

  • An unknown vulnerability on a computer network
  • A person posing a threat to an organization from within
  • IT security fails to protect its network
  • Employees who are angry at their employer

Which two reasons explain why influence campaigns are often effective?

  • Social media offers an inexpensive means to influence a large number of people
  • The bad actor can remain anonymous using fake accounts
  • Blackmail and bribery are effective in influencing people’s behavior
  • People are known to respond favorably to a well-reasoned argument

Which three attack methods are examples of social engineering? (Choose three.)

  • Whaling
  • Copycat
  • Honeypot
  • Zero day
  • Tailgating

What objective is accomplished by the last two stages of an influence campaign?

  • Clarification of the narrative
  • Access to the target’s network
  • Theft of information or money
  • Amplification of the message

What type of attack method is used by a blue hat to study the tactics of bad actors?

  • Sandboxing
  • Deception
  • Honeypot
  • Waterholing

Which attack method relies on a telephone or voice-over-IP to target individuals or small groups, such as members of a finance department?

  • Vishing
  • Honeypot
  • Smishing
  • Whaling

Which technique most accurately describes social engineering?

  • Exploiting computer weaknesses
  • Psychological manipulation
  • Quid pro quo
  • Zero-day attack

What social engineering attack uses an online site frequented by the target or targets to attack them?

  • Waterholing
  • Quid pro quo
  • Phishing
  • Pretexting

FCF – Introduction to the Threat Landscape 2.0 Self-Paced – Module 3: Social Engineering Quiz Answers

Module 1: Introduction to Cybersecurity Quiz Answers

Module 2: The Threat Landscape Quiz Answers

Module 3: Social Engineering Quiz Answers

Module 4: Malware Quiz Answers

About Clear My Certification

Check Also

Information Technology Management Professional CertificatioN

Information Technology Management Professional Certification

Information Technology Management Professional Certification Information Technology Management involves overseeing and directing the use of …

Leave a Reply

Your email address will not be published. Required fields are marked *