Describe two old-school social engineering tactics.
What will be an ideal response?
The most classic form of social engineering is the telephone scam in which someone calls a person and tries to get him or her to reveal his or her user name/password combination. In the same vein, someone may physically enter your building under the guise of having a legitimate reason for being there, such as a cleaning person, repair technician, or messenger. The attacker then snoops around desks, looking for whatever he or she has come to find (one of many good reasons not to put passwords on your desk or monitor). The attacker might talk with people inside the organization, gathering names, office numbers, or department names-little things in and of themselves, but powerful tools when combined later with other social engineering attacks.
You might also like to view...
The Office 365 University edition is limited to _________________________ computers.
Fill in the blank(s) with the appropriate word(s).
By adding an image to the header, it is displayed ________ the data on the spreadsheet
Fill in the blank(s) with the appropriate word(s).
You can configure IPv6 on Windows XP both automatically and manually. True or False?
a. True b. False
You can configure a local user with administrative rights to the RODC without designating this user as a member of the Domain Admins group. This user is included in the RODC's ____________ group
a. Enterprise admins b. Backup operators c. Local administrators d. Domain users