This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Build Your Knowledge of Social Engineering

| See more in Information Technology

You'll focus on foot-printing and social engineering.

Created Date 03.24.15
Last Updated 03.24.15
Viewed 97 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • What is the likely first step a potential attacker takes before deciding to target an organization?
  • Footprinting is the process of researching a potential target before carrying out an attack. Which of the following is not true regarding footprinting?
  • Which of these is a legal method to obtain information about a company's technologies?
  • Which of these is not a tool used to perform footprinting?
  • What two utilities can be used to perform zone transfers?
  • Which of these is not a typical goal of social engineering?
  • Which of these is not a tactic used in social engineering?
  • What is the biggest security threat facing organizations?
  • Which of these isn't a technique used in social engineering attacks?
  • What system can be exploited to allow an attacker to perform a zone transfer?
  • Reading what someone enters on a keyboard like a log-on name, password, or PIN is known as:
  • Obtaining information from a victim's trash is referred to as:
  • Which of these is not an effective way to prevent shoulder surfing?
  • Which of these methods are used by a company to permanently erase data from magnetic hard drives? This method doesn't apply to flash-based storage devices such as SSDs and flash drives.
  • Following closely behind employees as they enter a restricted area with the intention of bypassing physical security measures is referred to as: