0 of 10 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
A group of users visit and trust this site which gives attackers more reason to use this method?
Bob got a call from someone acting as a technician within the company he works for looking for information about the company’s infrastructure. What type of social engineering is this?
Tom keeps getting phone calls and voice messages from people claiming to be from reputable companies, asking him personal information, etc. What type of social engineering is Tom apart of?
The act of an attacker acting loud or mean is known as:
Using this method attackers try to make their victims feel like they are friends and have them think they can talk or tell them anything. What principle does this fall under?
Billy noticed that after downloading a document from the internet, his computer responds to any actions he made on his computer. So, if he pressed the enter key a new web browser would pop up. What service attack is Billy witnessing?
Max played a trick on his friend by duplicating his SSID as another access Point. What is the term known as that Max did?
Gaining unauthorized access to another personal Bluetooth device is known as:
Name a Cryptographic attack that is used to discover passwords:
This attack needs to be decrypted to become readable:
Try a couple of our sample lessons. This is our gift to you!