Social Engineer Test

10 Questions | Attempts: 137
Share

SettingsSettingsSettings
Social Engineer Test - Quiz

This test is for individuals who wants to be adept in social engineering tenets. Social engineering is concerned with the engagement of psychological manipulation techniques on unsuspecting persons with the aim of collecting useful information from them. Try this test to know where you stand as pertaining to information security. Good luck!


Questions and Answers
  • 1. 

    Which of the following is not a step in management of information security culture?

    • A.

      Pre-Evaluation

    • B.

      Post-Evaluation

    • C.

      Strategic planing

    • D.

      Corrective planing

    Correct Answer
    D. Corrective planing
  • 2. 

    Which of the following involves setting of new goals to be achieved for better awareness?

    • A.

      Strategic planning 

    • B.

      Operative planning

    • C.

      Pre-evaluation

    • D.

      Post-evaluation

    Correct Answer
    A. Strategic planning 
  • 3. 

    The implementation step is divided into 

    • A.

      Four stages

    • B.

      Five stages

    • C.

      Three stages

    • D.

      Two stages

    Correct Answer
    A. Four stages
  • 4. 

    Which of the following is another word for pretexting?

    • A.

      Manipulation

    • B.

      Behoing

    • C.

      Fooling technique

    • D.

      Invented scenario

    Correct Answer
    B. Behoing
  • 5. 

    Which of these is not a stage in implementation?

    • A.

      Commitment of the employees

    • B.

      Commitment of the management

    • C.

      Commitment of the social engineer 

    • D.

      Communication with organizational members

    Correct Answer
    C. Commitment of the social engineer 
  • 6. 

    Which of the following may not be of concern to a social engineer?

    • A.

      Date of birth

    • B.

      Social security number

    • C.

      Nationality

    • D.

      Last bill amount

    Correct Answer
    C. Nationality
  • 7. 

    Where did diversion threat originate?

    • A.

      West Germany

    • B.

      East London

    • C.

      Ukraine

    • D.

      Russia

    Correct Answer
    B. East London
  • 8. 

    The technique of obtaining personal information fraudulently is called 

    • A.

      Diversion theft

    • B.

      Baiting

    • C.

      Phishing

    • D.

      Water holing

    Correct Answer
    C. Phishing
  • 9. 

    Which of the following techniques can be likened to a trojan horse?

    • A.

      Water holing

    • B.

      Baiting 

    • C.

      Phone phishing

    • D.

      Spear phishing

    Correct Answer
    B. Baiting 
  • 10. 

    Which of these is not a measure employed in reducing security risks?

    • A.

      Standard framework

    • B.

      Personalised security

    • C.

      Security protocols

    • D.

      Scrutinizing information

    Correct Answer
    B. Personalised security

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 07, 2018
    Quiz Created by
    Timmy198
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.