Hi Guest

MobileUser

1 HomePage 1 Jobs 1 WalkIn 1Articles  

Cat Exam

 :) Latest Topic
AJAX
VB.NET
SQL Query
UDDI
CLASS
JavaScript Questions
SharePoint Interview
SilverLight
WCF
general knowledge
 ASP.NET
 :) Hot Jobs
 
 :) Latest Articles


  

 


Which of the following can be considered as a sound example of social engineering attack?
Question Posted on 26 Jul 2021

Home >> Important Topics >> Security Assessment >> Which of the following can be considered as a sound example of social engineering attack?




Which of the following can be considered as a sound example of social engineering attack?
Choose the correct option from below list
(1)Accessing a database with a cracked password
(2)An employee giving door access to an unknown person.
(3)Installing a hardware keylogger on an employee’s system to capture passwords
(4)Calling the help desk and tricking them to reset the password for a user account

Answer:-(4)Calling the help desk and tricking them to reset the password for a user account
0
0



 
 Input Your Comments Or suggestions(If Any)
 Name
 Email(optional)
 Comments


Other Important Questions
Which of the following is typically used by threat actors/security analysts trying to determine the security posture of externally accessible assets?
Which of the following assessment type works to determine whether a threat made/detected, is genuine?
Which among the following involves evaluating security against a standard to check for complaince?
Which of the following is best used for penetration testing?
The type of vulnerability scan that facilitates access to low-level data.






 
Top Searches:asp net questions vb net questions sql query uddl questions class javascript Questions sharepoint interview questions and concept silverlight questions and concept wcf questions beans general knowledge ajax questions
PHP | Biztalk | Testing | SAP | HR |