Here are Top 30 multiple-choice questions (MCQs) only focused on the Phishing and social engineering in the context of Cyber Threats and Attack Vectors, along with their answers and explanations.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. What is phishing primarily aimed at?

  • Disrupting network services
  • Gaining unauthorized access to a system
  • Stealing sensitive information by deception
  • Encrypting files for ransom

2. What is spear phishing targeting specifically?

  • Random individuals
  • Large organizations
  • Individuals within a specific organization
  • Government agencies

3. Which is a common characteristic of a phishing email?

  • Plain text without any links
  • Urgent language, threats, or promises
  • A formal and professional tone
  • A clear sender address

4. What is vishing in the context of social engineering?

  • Video-based phishing attacks
  • Voice-based phishing attacks
  • Virtual reality-based attacks
  • Vendor-specific phishing attacks

5. What is the primary goal of baiting in social engineering?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Tempting individuals with something appealing to extract information
  • Encrypting files for ransom

6. Which term describes the creation of a fake website to trick individuals into revealing sensitive information?

  • Spoofing
  • Pharming
  • Baiting
  • Impersonation

7. What is pretexting in the context of social engineering?

  • Creating a false identity or scenario to manipulate individuals
  • Using malicious software to intercept communication
  • Manipulating search engine results to deceive users
  • Embedding malicious code in legitimate websites

8. Which social engineering technique involves creating a sense of urgency to prompt immediate action?

  • Quizzes and surveys
  • Impersonation
  • Urgency or time pressure
  • Baiting

9. What is the primary purpose of a whaling attack?

  • Targeting specific individuals within an organization
  • Attacking large organizations with sophisticated techniques
  • Using deception to trick individuals into revealing information
  • Targeting high-profile individuals, such as executives

10. What is the term for a deceptive technique where attackers manipulate the display of a website URL?

  • URL hijacking
  • URL masking
  • URL spoofing
  • URL encryption

11. What is a common characteristic of a spear phishing attack?

  • Indiscriminate targeting of individuals
  • Use of generic and non-personalized messages
  • Personalized and targeted messages
  • Inclusion of obvious spelling and grammar mistakes

12. What is the primary goal of a CEO fraud attack?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Impersonating a CEO to trick employees into transferring funds or sensitive information
  • Encrypting files for ransom

13. What is the term for a phishing attack that targets a specific geographic region or group of individuals?

  • Regional phishing
  • Geo-targeted phishing
  • Targeted phishing
  • Area-specific phishing

14. Which type of social engineering attack involves manipulating individuals to provide confidential information over the phone?

  • Phishing
  • Vishing
  • Baiting
  • Impersonation

15. What is the primary objective of a honey trap in social engineering?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Tricking individuals into revealing sensitive information through a romantic or sexual relationship
  • Encrypting files for ransom

16. What is the term for a phishing attack that targets a specific industry or business sector?

  • Industry-targeted phishing
  • Sector-specific phishing
  • Business-focused phishing
  • Whaling attack

17. What is the primary goal of a quid pro quo attack in social engineering?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Offering a benefit or reward in exchange for sensitive information
  • Encrypting files for ransom

18. What is the term for a phishing attack that uses fraudulent emails claiming to be from a trustworthy source to trick individuals into revealing sensitive information?

  • Spoofing
  • Deceptive email attack
  • Email impersonation
  • Email phishing

19. Which is a characteristic of a social engineering attack using impersonation?

  • Openly revealing the attacker's identity
  • Pretending to be a trustworthy person or entity
  • Using non-deceptive communication techniques
  • Targeting a wide range of individuals

20. What is the primary goal of a water holing attack in social engineering?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Compromising websites frequented by the target individuals
  • Encrypting files for ransom

21. Which is a common characteristic of a smishing attack?

  • Email-based attack
  • Voice-based attack
  • Text message-based attack
  • Social media-based attack

22. What is the term for a phishing attack that targets individuals within a specific organization, often using internal information?

  • Whaling attack
  • CEO fraud attack
  • Insider threat attack
  • Business email compromise

23. What is the primary objective of a clone phishing attack?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Creating a duplicate website to deceive individuals
  • Encrypting files for ransom

24. What is the term for a phishing attack that targets individuals during their commute, often using public transportation Wi-Fi networks?

  • Commute-based phishing
  • Mobile phishing
  • Public Wi-Fi phishing
  • On-the-go phishing

25. What is the primary goal of a reverse social engineering attack?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Manipulating individuals into taking specific actions
  • Encrypting files for ransom

26. What is the term for a social engineering attack that involves creating a fake social media profile to deceive individuals?

  • Catfishing
  • Profile spoofing
  • Social impersonation
  • Social phishing

27. What is the primary goal of a lottery scam in the context of social engineering?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Tricking individuals into believing they've won a prize, then extracting money or information
  • Encrypting files for ransom

28. Which social engineering technique involves appealing to individuals' emotions to manipulate them?

  • Emotional engineering
  • Social manipulation
  • Psychological exploitation
  • Emotional manipulation

29. What is the term for a phishing attack that targets a specific group of individuals based on their job roles and responsibilities?

  • Role-based phishing
  • Job-targeted phishing
  • Occupation-specific phishing
  • Task-focused phishing

30. What is the primary goal of a scareware attack in the context of social engineering?

  • Gaining unauthorized access to systems
  • Spreading malware through infected files
  • Creating a false sense of urgency to trick individuals into paying for unnecessary software or services
  • Encrypting files for ransom
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook