logo

CuriousTab

CuriousTab

Discussion


Home Interview Technology See What Others Are Saying!
  • Question
  • Social engineering attacks are best identified by


  • Options
  • A. Ransomware
  • B. Phishing
  • C. Both A & B
  • D. None of the above

  • Correct Answer
  • Both A & B 

    Explanation

    Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

     

  • Tags: Analyst, Database Administrator, IT Trainer, Network Engineer, Project Manager

    More questions

    • 1. Write SQL Query to display current date?
    • Discuss
    • 2. Which is more effective while calling the functions?

    • Options
    • A. call by value
    • B. call by reference
    • C. call by pointer
    • D. none
    • Discuss
    • 3. Which of the following is not the member of class?

    • Options
    • A. Virtual function
    • B. Static function
    • C. Friend function
    • D. Const function
    • Discuss
    • 4. Which of the following gives the memory address of the first element in array?

    • Options
    • A. array[0];
    • B. array[1];
    • C. array(2);
    • D. array;
    • Discuss
    • 5. Write an SQL Query to check whether date passed to Query is date of given format or not.
    • Discuss
    • 6. What is the scope resolution operator?
    • Discuss
    • 7. What are the support tickets given in SAP fico module? please give some examples.
    • Discuss
    • 8. Which of the following attribute can hold the JavaScript version?

    • Options
    • A. script
    • B. version
    • C. language
    • D. none of the above
    • Discuss
    • 9. What is recovery/error testing?
    • Discuss
    • 10. Which design patterns benefit from the multiple inheritance?

    • Options
    • A. Adapter and observer pattern
    • B. Code pattern
    • C. Glue pattern
    • D. None of these
    • Discuss


    Comments

    There are no comments.

Enter a new Comment