Social Engineer Test

10 Questions | Attempts: 137
Share
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. Which of the following may not be of concern to a social engineer?
Submit
Please wait...
About This Quiz
Social Engineer Test - Quiz

This test is for individuals who wants to be adept in social engineering tenets. Social engineering is concerned with the engagement of psychological manipulation techniques on unsuspecting persons with the aim of collecting useful information from them. Try this test to know where you stand as pertaining to information security.... see moreGood luck! see less

Personalize your quiz and earn a certificate with your name on it!
2. The implementation step is divided into 
Submit
3. Which of these is not a stage in implementation?
Submit
4. The technique of obtaining personal information fraudulently is called 
Submit
5. Which of the following is not a step in management of information security culture?
Submit
6. Which of the following involves setting of new goals to be achieved for better awareness?
Submit
7. Which of the following is another word for pretexting?
Submit
8. Where did diversion threat originate?
Submit
9. Which of the following techniques can be likened to a trojan horse?
Submit
10. Which of these is not a measure employed in reducing security risks?
Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 07, 2018
    Quiz Created by
    Timmy198
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following may not be of concern to a social engineer?
The implementation step is divided into 
Which of these is not a stage in implementation?
The technique of obtaining personal information fraudulently is...
Which of the following is not a step in management of information...
Which of the following involves setting of new goals to be achieved...
Which of the following is another word for pretexting?
Where did diversion threat originate?
Which of the following techniques can be likened to a trojan horse?
Which of these is not a measure employed in reducing security risks?
Alert!

Advertisement