Which social engineering approach involves a user masquerading as a real or fictitious character and then plays out the role of that person on a victim?
A. phishing
B. spam
C. impersonation
D. watering hole attacks
Ans: C. impersonation
You might also like to view...
With regard to the media's portrayal of juvenile delinquency, which of the following statements is NOT true?
a. Only a small number of youths are delinquent. b. Most juvenile delinquents commit serious crimes. (P. 30) c. The vast majority of juvenile arrests are for property crimes, vandalism, and status offenses. d. Only 7 to 10 percent of delinquents are chronic offenders.
When entering high school, students are separated into different groups based on their educational performance in elementary school, test scores, and academic goals. This is an example of ______.
A. hidden curriculum B. secondary socialization C. school choice D. tracking
Which of the following is an abuse-prevention strategy?
a. foster care placement b. public education and media campaigns c. shelters and safe houses d. arrest and prosecution
Reliance on spiritual beliefs helps people to
a. ignore their problems. b. be distracted from their problems. c. focus on the parts of the problem that may be under their control. d. share their problems with others who are also religious.