List and explain the five techniques used by social engineers in their attempts to gain information from unsuspecting people.

What will be an ideal response?


- Urgency: "I need the information now, or the world will come to an end!"
- Quid pro quo: "I can make your life better if you give me the information I need."
- Status quo: "Everyone else is doing it, so you should, too."
- Kindness: "It's easier to catch flies with honey than with vinegar."
- Position: Convincing an employee that you're in a position of authority in the company can be a powerful means of gaining information.

Computer Science & Information Technology

You might also like to view...

The primary purpose of an application letter is to get a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The most common macOS and Linux performance monitor tool is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ jQuery UI widget displays content in an interactive overlay.

A. Dialog B. Buttonset C. Tabs D. Pop-UP

Computer Science & Information Technology

To edit a label after you've pressed the Enter key, click the cell, then click in the ____________________ bar.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology