in Education by
___________ is a special form of attack using which hackers’ exploit – human psychology. (a) Cross Site Scripting (b) Insecure network (c) Social Engineering (d) Reverse Engineering This question was addressed to me in unit test. The origin of the question is Social Engineering and Physical Hacking topic in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (c) Social Engineering To explain I would say: Using social engineering techniques, hackers try to exploit the victim’s mind to gain valuable information about that person such as his/her phone number, date of birth, pet name etc.

Related questions

0 votes
    Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. (a) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following do not comes under hurdles of passive online attack for hackers? (a) Hard to ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    The main motive for using steganography is that hackers or other users can hide a secret message behind a ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    There are ________ types of exploit. (a) 3 (b) 2 (c) 5 (d) 4 I had been asked this question during an ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Remote exploits is that type of exploits acts over any network to exploit on security vulnerability. (a) True (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Email users who use IE as their _________________ are vulnerable to Reaper Exploit. (a) Web engine (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    By gaining access to the Trojaned system the attacker can stage different types of attack using that ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...