Which of the following best describes a common method used in phishing attacks?
Think about how attackers trick people into giving away sensitive data.
Phishing commonly involves sending fake emails that look real to trick people into sharing personal information.
Which of the following is an example of social engineering?
Social engineering involves manipulating people rather than technology.
Social engineering tricks people into giving information, like pretending to be IT support to get passwords.
Which feature in an email is most likely a sign of a phishing attempt?
Phishing emails often try to create a sense of urgency and ask for sensitive info.
Urgent requests with suspicious links asking for account verification are common phishing signs.
What is the main difference between phishing and spear phishing attacks?
Consider how attackers choose their victims in each case.
Phishing casts a wide net, while spear phishing is a focused attack on specific targets.
Which defense strategy is most effective in reducing the risk of social engineering attacks?
Think about how social engineering exploits human behavior.
Training people to spot and report suspicious behavior helps prevent social engineering attacks effectively.