Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
Home
Security Assessment
Which of the following exploits psychological manipulation in deceiving users to make security...
0
votes
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
Select the appropriate answer from below options:
a) Footprinting
b) Reconnaissance
c) Social Engineering
d) Fingerprinting
security-mistakes
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Aug 17, 2021
by
Robindeniel
Correct answer of the above question is : c) Social Engineering
Related questions
0
votes
Q: What is an attack that exploits the trust a site has in a user’s browser?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
user-browser
0
votes
Q: Which among the following involves evaluating security against a standard to check for complaince?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-evaluating
0
votes
Q: Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-analysis
0
votes
Q: Which of the following should be covered under the security policy?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-policy
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
0
votes
Q: AWS supports which of the following methods to add security to Identity and Access Management (IAM) users? (Select TWO)
asked
Apr 16
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-practice-exam
+1
vote
Q: IPSec is designed to provide security at the _________.
asked
Feb 5, 2023
in
Security Assessment
by
AdilsonLima
ipsecurity-interview-questions-answers
0
votes
Q: The type of security assessment that aims to test the organizations detection and response capabilities
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-detection
+1
vote
Q: Number of attributes used in Security Testing?
asked
Feb 5, 2023
in
Security Assessment
by
AdilsonLima
ipsecurity-interview-exam-question-answer
...