COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What social engineering technique involves someone pretending to need your information to confirm the identity of who they are talking to?
A
Pretexting
B
Baiting
C
Quid pro quo
D
None of the above
Explanation: 

Detailed explanation-1: -Phishing. As one of the most popular social engineering attack types, phishing scams are email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims.

Detailed explanation-2: -Vishing. Also known as voice phishing, vishing involves the use of social engineering over the phone to gather financial or personal information from the target.

Detailed explanation-3: -Pretexting Pretexting is a fairly sophisticated type of social engineering attack in which a scammer creates a pretext or fabricated scenario-pretending to be an IRS auditor, for example-to con someone into providing sensitive personal or financial information, such as their social security number.

Detailed explanation-4: -A social engineering technique to get a user’s phone number allows attackers to have a phone conversation with their potential victims to establish a pretext for their social engineering attack. The attacker simply sends an email to the intended target asking for that person’s phone number.

There is 1 question to complete.