adplus-dvertising
frame-decoration

Question

___________ is a special form of attack using which hackers’ exploit – human psychology.

a.

Cross Site Scripting

b.

Insecure network

c.

Social Engineering

d.

Reverse Engineering

Posted under Cyber Security

Answer: (c).Social Engineering

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ___________ is a special form of attack using which hackers’ exploit – human psychology.

Similar Questions

Discover Related MCQs

Q. Which of the following do not comes under Social Engineering?

Q. _________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data.

Q. Which of the following is the technique used to look for information in trash or around dustbin container?

Q. Which of the following is not an example of social engineering?

Q. In a phishing, attackers target the ________ technology to so social engineering.

Q. Tailgating is also termed as ___________

Q. Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations.

Q. Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.

Q. ________ is the ability of an individual to gain physical access to an authorized area.

Q. Which of the following is not considering the adequate measure for physical security?

Q. Which of the following is not a physical security measure to protect against physical hacking?

Q. IT security department must periodically check for security logs and entries made during office hours.

Q. Which of them is not an example of physical hacking?

Q. Physical _________ is important to check & test for possible physical breaches.

Q. ___________ ensures the integrity and security of data that are passing over a network.

Q. Which of the following is not a strong security protocol?

Q. Which of the following is not a secured mail transferring methodology?

Q. __________ is a set of conventions & rules set for communicating two or more devices residing in the same network?

Q. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

Q. HTTPS is abbreviated as _________