Digital Security Awareness
Module 3: Social Engineering
- Which method of social engineering would be described as watching someone enter their password?
Choose one answer.
- Eavesdropping
- Impersonation
- Shoulder surfing
- Phishing
2. Which would be better for a more secure password?
Choose one answer.
- Longer password (15 or more characters)
- Complex password
3. What can be done to deter a social engineer who attacks over the phone?
Choose one answer.
- All of the above
- Call backs
- Verification
- Awareness
4. Which method of social engineering would be described as sending a forged e-mail to a victim in an attempt to gather that person’s information?
Choose one answer.
- Eavesdropping
- Shoulder surfing
- Impersonation
- Phishing
5. True or False: A misspelled URL will not cause a problem for an end-user, because it will automatically be sent to the real targeted URL.
Answer true or false
- True
- False
6. How can you best stop a hacker from gaining information through dumpster diving?
Choose one answer.
- Have each user take their paperwork home
- Place guards at the dumpsters
- Shred all documents
- Don’t print out important documents
7. What method do hackers use more than 50% of the time to help them in hacking?
Choose one answer.
- Social engineering
- Network captures
- Digital decryption
- Wiretaps
8. Social engineers may send fake e-mail (often impersonating another website) for the purpose of getting a user to believe the spoof, then stealing their login information. This process is known as what?
Choose one answer.
- Impersonation
- Dumpster diving
- Pharming
- Phishing