You are on page 1of 1

Unit 5 – Basics of Hacking

1. What are the steps of Social Engineering Cycle?


a. Gather Information, Plan Attack, Acquire Knowledge, Attack, Exploit Human greed
b. Plan Attack, Attack, Familiarity exploit, Phishing techniques, Acquire Tools
c. Gather Information, Plan Attack, Acquire Tools, Attack, Use acquired Knowledge
d. Acquire Tools, Use acquired Knowledge, Phishing Techniques, Familiarity Exploit
2. Countermeasures for Social Engineering includes:
a. To counter Tailgating Attacks
b. To counter intimidating circumstances attack
c. To counter human curiosity
d. All of the above
3. The main reason why Hacker’s hack is because they find it extremely satisfying to solve
puzzles and fix the unfixable.
a. True
b. False
4. What is a Malicious User?
a. It is similar to White Hat Hacker
b. A rogue employee, contractor, intern or other user who abuses his or her
privileges.
c. They provide security from unauthorized access
d. None of the above
5. Ethical Hackers must abide to following rule:
a. Get written permission from owner of the computer system before hacking
b. Transparently report all the identified weaknesses in the computer system.
c. Inform Hardware and Software vendors about the weaknesses
d. All of the above
6.

You might also like