What is Social Engineering?
*
A method of securely encrypting data.
A set of techniques used to manipulate people into giving up confidential information.
A software tool used to strengthen network security.
A protocol for secure communication over a computer network.
Which of these is a common type of social engineering attack?
*
Phishing
SQL injection
Man-in-the-middle attack
Denial-of-Service attack
What should you do if you receive an unexpected request for sensitive information over the phone?
*
Provide the information if the caller seems legitimate.
Hang up and call back using a number you know is correct.
Ignore the request and do not respond to the caller.
Transfer the caller to another department.
How can social engineering be prevented at your workplace?
*
By installing antivirus software on all computers.
By conducting regular security audits of physical and digital assets.
By educating employees about security protocols and conducting regular training.
All of the above.
What is “tailgating” in the context of social engineering?
*
Following closely behind another vehicle to save fuel.
When an unauthorized person physically follows someone into a restricted area.
Sending out bulk emails to get personal data.
A method of tracking people using mobile apps.
Which action might indicate that a colleague might be a victim of a social engineering attack?
*
They use complex passwords.
They keep their office door closed.
They share their screen during virtual meetings.
They mention clicking a strange link or revealing a password.
What is a baiting attack in social engineering?
*
Offering something enticing to the victim, like free software downloads, to compromise their security.
Sending fake invoices to the accounting department.
Requesting confidential information under the guise of a routine security check.
None of the above.
Which is a sign of a potential phishing email, a common social engineering tactic?
*
The email is from a public email domain.
The email uses a generic greeting, like “Dear Customer.”
The email urges immediate action.
All of the above.
What is the best practice when handling sensitive information in the workplace to prevent social engineering attacks?
*
Discuss sensitive information openly to promote transparency.
Always verify the identity of the requester through multiple channels.
Store all sensitive information on the cloud without backups.
Use simple passwords for easy recall.
What should you do if you suspect you have been targeted by a social engineering attack?
*
Keep it to yourself to avoid embarrassment.
Immediately inform your supervisor and the IT department.
Delete all emails and messages received from unknown sources.
Wait and see if any negative consequences occur.
Full Name
Email
*