This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Build Your Knowledge of Social Engineering

| See more in Information Technology

You'll focus on foot-printing and social engineering.

TBaeten
By
Created Date 03.24.15
Last Updated 03.24.15
Viewed 101 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • What is the likely first step a potential attacker takes before deciding to target an organization?
  • Footprinting is the process of researching a potential target before carrying out an attack. Which of the following is not true regarding footprinting?
  • Which of these is a legal method to obtain information about a company's technologies?
  • Which of these is not a tool used to perform footprinting?
  • What two utilities can be used to perform zone transfers?
  • Which of these is not a typical goal of social engineering?
  • Which of these is not a tactic used in social engineering?
  • What is the biggest security threat facing organizations?
  • Which of these isn't a technique used in social engineering attacks?
  • What system can be exploited to allow an attacker to perform a zone transfer?
  • Reading what someone enters on a keyboard like a log-on name, password, or PIN is known as:
  • Obtaining information from a victim's trash is referred to as:
  • Which of these is not an effective way to prevent shoulder surfing?
  • Which of these methods are used by a company to permanently erase data from magnetic hard drives? This method doesn't apply to flash-based storage devices such as SSDs and flash drives.
  • Following closely behind employees as they enter a restricted area with the intention of bypassing physical security measures is referred to as: