Social Engineer Test

10 Questions

Settings
Please wait...
Social Engineer Test

This test is for individuals who wants to be adept in social engineering tenets. Social engineering is concerned with the engagement of psychological manipulation techniques on unsuspecting persons with the aim of collecting useful information from them. Try this test to know where you stand as pertaining to information security. Good luck!


Questions and Answers
  • 1. 
    Which of the following is not a step in management of information security culture?
    • A. 

      Pre-Evaluation

    • B. 

      Post-Evaluation

    • C. 

      Strategic planing

    • D. 

      Corrective planing

  • 2. 
    Which of the following involves setting of new goals to be achieved for better awareness?
    • A. 

      Strategic planningĀ 

    • B. 

      Operative planning

    • C. 

      Pre-evaluation

    • D. 

      Post-evaluation

  • 3. 
    The implementation step is divided into 
    • A. 

      Four stages

    • B. 

      Five stages

    • C. 

      Three stages

    • D. 

      Two stages

  • 4. 
    Which of the following is another word for pretexting?
    • A. 

      Manipulation

    • B. 

      Behoing

    • C. 

      Fooling technique

    • D. 

      Invented scenario

  • 5. 
    Which of these is not a stage in implementation?
    • A. 

      Commitment of the employees

    • B. 

      Commitment of the management

    • C. 

      Commitment of the social engineerĀ 

    • D. 

      Communication with organizational members

  • 6. 
    Which of the following may not be of concern to a social engineer?
    • A. 

      Date of birth

    • B. 

      Social security number

    • C. 

      Nationality

    • D. 

      Last bill amount

  • 7. 
    Where did diversion threat originate?
    • A. 

      West Germany

    • B. 

      East London

    • C. 

      Ukraine

    • D. 

      Russia

  • 8. 
    The technique of obtaining personal information fraudulently is called 
    • A. 

      Diversion theft

    • B. 

      Baiting

    • C. 

      Phishing

    • D. 

      Water holing

  • 9. 
    Which of the following techniques can be likened to a trojan horse?
    • A. 

      Water holing

    • B. 

      BaitingĀ 

    • C. 

      Phone phishing

    • D. 

      Spear phishing

  • 10. 
    Which of these is not a measure employed in reducing security risks?
    • A. 

      Standard framework

    • B. 

      Personalised security

    • C. 

      Security protocols

    • D. 

      Scrutinizing information