Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
Home
Security Assessment
Which of the following exploits psychological manipulation in deceiving users to make security...
0
votes
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
Select the appropriate answer from below options:
a) Footprinting
b) Reconnaissance
c) Social Engineering
d) Fingerprinting
security-mistakes
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Aug 17, 2021
by
Robindeniel
Correct answer of the above question is : c) Social Engineering
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: What is an attack that exploits the trust a site has in a user’s browser?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
user-browser
0
votes
Q: Which among the following involves evaluating security against a standard to check for complaince?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-evaluating
0
votes
Q: Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-analysis
0
votes
Q: Which of the following should be covered under the security policy?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-policy
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
+1
vote
Q: IPSec is designed to provide security at the _________.
asked
Feb 5, 2023
in
Security Assessment
by
AdilsonLima
ipsecurity-interview-questions-answers
0
votes
Q: The type of security assessment that aims to test the organizations detection and response capabilities
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-detection
0
votes
Q: In SQL, which of the following is not a data Manipulation Language Commands?
asked
Nov 25, 2021
in
Oracle
by
DavidAnderson
oracle
0
votes
Q: Which of the following is not included in DML (Data Manipulation Language)
asked
Nov 24, 2021
in
Oracle
by
DavidAnderson
oracle
...