Multiple Choice
All of the following are techniques used by a social engineer EXCEPT:
A) An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.
B) An attacker calls up the IT department posing as an employee and requests a password reset.
C) An attacker runs a brute force attack on a password.
D) An attacker sends a forged e-mail with a link to a bogus web site that has been set to obtain personal information.
Correct Answer:

Verified
Correct Answer:
Verified
Q9: What is a good first step for
Q10: Leaving sensitive information in a car is
Q11: An attacker posts a flier offering services
Q12: What are the dangers of non-employees having
Q13: When an attacker attempts to get credit
Q15: Dumpster diving is when a hacker gains
Q16: Give an example of a hoax and
Q17: A(n)_ is an avenue that can be
Q18: An attacker watches people as they enter
Q19: Your boss saw a TV show that