Recall & Review
beginner
What is social engineering in the context of cybersecurity?
Social engineering is a trick used by attackers to manipulate people into giving away confidential information or access, often by pretending to be someone trustworthy.
Click to reveal answer
beginner
Name three common social engineering techniques.
Phishing (fake emails or messages), Pretexting (creating a fake story to gain trust), and Tailgating (following someone into a secure place without permission).
Click to reveal answer
beginner
Why is it important to verify the identity of someone asking for sensitive information?
Because attackers often pretend to be trusted people to trick you. Verifying identity helps prevent giving access or information to the wrong person.
Click to reveal answer
beginner
What should you do if you receive an unexpected email asking for your password?
Do not reply or click any links. Instead, contact the person or company directly using a known phone number or website to check if the request is real.
Click to reveal answer
beginner
How can regular training help prevent social engineering attacks?
Training teaches people to recognize tricks and suspicious behavior, so they can avoid falling for scams and protect themselves and their organization.
Click to reveal answer
Which of the following is an example of social engineering?
✗ Incorrect
Social engineering involves tricking people, like fake emails asking for passwords.
What is 'phishing'?
✗ Incorrect
Phishing is sending fake emails or messages to trick people into giving sensitive info.
If someone you don’t know asks for your login details, what should you do?
✗ Incorrect
Never share login details; report suspicious requests to stay safe.
Tailgating in social engineering means:
✗ Incorrect
Tailgating is when someone follows another person into a restricted place without authorization.
Why should you be cautious about clicking links in unexpected emails?
✗ Incorrect
Links in fake emails can lead to dangerous sites designed to steal your data.
Explain what social engineering is and give two examples of how attackers use it.
Think about how people are tricked rather than technical hacks.
You got /2 concepts.
Describe three ways you can protect yourself from social engineering attacks.
Focus on actions you can take when someone asks for sensitive info.
You got /3 concepts.