answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Preventing social engineering attacks
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which two actions can be considered social engineering attacks?

Phishing, baiting and tailgating are all examples of social engineering attacks.


What guidelines is a measure for preventing a social engineering attack?

Do not use portable storage devices.


A measure for preventing a social engineering attack except?

One of the best ways to prevent a social engineering attack is to use a good anti-virus program and to always choose strong passwords.


Are Social engineering attacks are only successful if the attacker is able to obtain all the information about your network?

yes


Is Social engineering attacks only successful if the attacker is able to obtain all the information about your network?

yes


Is Social engineering attacks are only successful if the attacker is able to obtain all the information about your network?

yes


List two examples of categories for both passive and active network security attacks?

passive attacks : footprinting, trashing active attacks : sniffing, social engineering


What are the measures in preventing a social engineering attact?

keeping hidden from public view any passwords that are posted in the work area


What is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information?

Social Engineering


What social engineering attacks?

Attacks using social engineering rely on human trust - and by exploiting trust, one can gain access to computer systems much quicker than resorting to traditional methods if said systems are hardened to a point where it is not possible to gain entry within a short amount of time. For example, take a look at XKCD's comic strip about this topic.


Exploiting people to gain sensitive information is most associated with?

social engineering


Show all the attacks based on malicious code?

Trojan horse, virus and worm not social engineering by prana kumar dubey, hcl cdc, agra