COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
A
A social engineer
B
Man-in-the-Middle
C
A Hacker
D
IT Technician
Explanation: 

Detailed explanation-1: -Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access.

Detailed explanation-2: -Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file.

Detailed explanation-3: -Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

Detailed explanation-4: -The true art of social engineering is to elicit information from the victim without directly asking for it. This technique can be used via voice or email, using different types of questions and techniques to passively force the victims into revealing sensitive information.

Detailed explanation-5: -Baiting. As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. Pretexting. Phishing. Spear phishing.

There is 1 question to complete.