Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
Home
Security Assessment
Which of the following exploits psychological manipulation in deceiving users to make security...
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
Select the appropriate answer from below options:
a) Footprinting
b) Reconnaissance
c) Social Engineering
d) Fingerprinting
security-mistakes
1
Answer
0
votes
answered
Aug 17, 2021
by
Robindeniel
Correct answer of the above question is : c) Social Engineering
Related questions
0
votes
What is an attack that exploits the trust a site has in a user’s browser?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
user-browser
0
votes
Which among the following involves evaluating security against a standard to check for complaince?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-evaluating
0
votes
Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-analysis
0
votes
Which of the following should be covered under the security policy?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-policy
0
votes
Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
Which of the following attack method aims to gather confidential information by deceiving the victim?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
+1
vote
IPSec is designed to provide security at the _________.
asked
Feb 5
in
Security Assessment
by
AdilsonLima
ipsecurity-interview-questions-answers
0
votes
The type of security assessment that aims to test the organizations detection and response capabilities
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-detection
0
votes
Facebook launches cryptocurrency which allows users to make financial transactions across the globe. It's named as
asked
Oct 19, 2019
in
Other
by
JackTerrance
#currentaffair
#generalknowledge
#gk
0
votes
In SQL, which of the following is not a data Manipulation Language Commands?
asked
Nov 25, 2021
in
Oracle
by
DavidAnderson
oracle
0
votes
Which of the following is not included in DML (Data Manipulation Language)
asked
Nov 24, 2021
in
Oracle
by
DavidAnderson
oracle
0
votes
Which of the following ensure the authenticity of personal involved in the manipulation of information & later cannot deny the involvement?
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
ssa
+1
vote
Number of attributes used in Security Testing?
asked
Feb 5
in
Security Assessment
by
AdilsonLima
ipsecurity-interview-exam-question-answer
+1
vote
WPA2 is used for security in _______.
asked
Feb 5
in
Security Assessment
by
AdilsonLima
ipsecurity-interview-questions-answers
+1
vote
Integrity is the attributes of Security Testing?
asked
Feb 5
in
Security Assessment
by
AdilsonLima
ipsecurity-interview-questions-answers
0
votes
Assessing security and auditing security mean the same thing.
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-assessing
security-audit
0
votes
Reconnaissance in information security is used for _______________
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
reconnaissance
information-security
+1
vote
An attempt to make a computer resource unavailable to its intended users is called ______.
asked
Feb 5
in
Secure Code Review
by
AdilsonLima
ipsecurity-interview-exam-question-answer
0
votes
_____________ learning draws inspiration from psychological behavior.
asked
Apr 26, 2020
in
Other
by
SakshiSharma
#psycological-behavior
+3
votes
_____________ learning draws inspiration from psychological behavior.
asked
Feb 6, 2020
in
Artificial Intelligence
by
GeorgeBell
supervised-learning
unsupervised-learning
#probability-data
...