Software Development Exam  >  Software Development Notes  >  Ethical Hacking using Kali Linux (in English)  >  Assignment: Social Engineering Attacks

Assignment: Social Engineering Attacks | Ethical Hacking using Kali Linux (in English) - Software Development PDF Download

Multiple Choice Questions (MCQs)

Q1: What is the main goal of a social engineering attack?
(a) Exploit system vulnerabilities
(b) Manipulate people into revealing confidential information
(c) Infect systems with malware
(d) Brute force user passwords
Ans: (b) Manipulate people into revealing confidential information

Q2: Which of the following is a common type of phishing attack?
(a) SQL Injection
(b) Spear Phishing
(c) Port Scanning
(d) Buffer Overflow
Ans: (b) Spear Phishing

Q3: What is the primary difference between phishing and spear phishing?
(a) Phishing targets individuals, while spear phishing targets large groups
(b) Spear phishing is more personalized and targets specific individuals
(c) Phishing uses email, while spear phishing only uses phone calls
(d) Spear phishing is automated, while phishing is manual
Ans: (b) Spear phishing is more personalized and targets specific individuals

Q4: What type of attack involves an attacker posing as a trusted entity to gather sensitive data?
(a) Phishing
(b) Ransomware
(c) DDoS
(d) Keylogging
Ans: (a) Phishing

Q5: Which of the following is an example of baiting?
(a) A fake login page designed to steal credentials
(b) A USB drive left in a public place containing malware
(c) A website that encrypts user files for ransom
(d) A brute force attack on a password-protected account
Ans: (b) A USB drive left in a public place containing malware

Q6: What is the primary objective of tailgating in social engineering?
(a) To physically gain access to restricted areas
(b) To track an individual’s location
(c) To manipulate software vulnerabilities
(d) To encrypt user data
Ans: (a) To physically gain access to restricted areas

Q7: What social engineering technique involves pretending to be a trusted authority to obtain information?
(a) Pretexting
(b) Baiting
(c) Quid pro quo
(d) Smishing
Ans: (a) Pretexting

Q8: Which attack method uses SMS messages to trick victims into revealing sensitive data?
(a) Vishing
(b) Smishing
(c) Pharming
(d) Tailgating
Ans: (b) Smishing

Q9: Which of the following is an effective way to prevent social engineering attacks?
(a) Using strong passwords
(b) Regular security awareness training
(c) Installing a firewall
(d) Running regular antivirus scans
Ans: (b) Regular security awareness training

Q10: What technique involves tricking an employee into resetting their password and sharing it with the attacker?
(a) Shoulder surfing
(b) Quid pro quo
(c) Phishing
(d) Pretexting
Ans: (b) Quid pro quo

Fill in the Blanks

Q1: ________ is a type of attack where an attacker leaves a malware-infected USB drive in a public place.
Ans: Baiting

Q2: The act of tricking people into revealing their passwords over the phone is called ________.
Ans: Vishing

Q3: ________ is a social engineering technique that involves following an authorized person into a restricted area.
Ans: Tailgating

Q4: Spear phishing is a ________ targeted attack that appears to come from a trusted source.
Ans: Highly personalized

Q5: ________ is a technique where attackers impersonate a trusted authority to extract sensitive information.
Ans: Pretexting

True/False

1. Phishing attacks can only be carried out via email.
Ans: False

2. Social engineering exploits human psychology rather than technical vulnerabilities.
Ans: True

3. Tailgating is when an attacker gains unauthorized access to a system remotely.
Ans: False

4. Multi-factor authentication can help reduce the risk of social engineering attacks.
Ans: True

5. Security awareness training can prevent most social engineering attacks.
Ans: True

Download the notes
Assignment: Social Engineering Attacks
Download as PDF
Download as PDF

HOTS (Higher Order Thinking Skills) Questions

Q1: An employee receives an urgent email from their CEO asking for login credentials. What steps should they take before responding?
Ans: Verify the sender’s email, check for spelling errors, confirm with the CEO via another communication method, and report the email to IT.

Q2: You suspect a phishing attack in your organization. How would you investigate and prevent further damage?
Ans: Analyze email headers, check links for suspicious domainseducate employees, and implement email filtering solutions.

Q3: A security team finds a USB drive labeled “Company Bonuses” in the parking lot. What should they do?
Ans: Do not plug it into any system, report it to the IT department, and analyze it in a controlled environment using a sandbox.

Q4: An attacker impersonates an IT support technician and calls an employee asking for their password. How should the employee respond?
Ans: Refuse to provide any credentials, verify the caller’s identity through official channels, and report the incident to IT security.

Q5: A company wants to test its employees' resistance to social engineering attacks. What measures can be taken?
Ans: Conduct simulated phishing attacks, provide training, implement strict access controls, and enforce a policy against sharing sensitive information.

Take a Practice Test
Test yourself on topics from Software Development exam
Practice Now
Practice Now

Hands-on Coding Questions

Q1: Write a Python script that detects suspicious email domains commonly used in phishing attacks.
Ans:

phishing_domains = ["mail.com", "secure-login.com", "bank-update.com"]
email = input("Enter sender email: ")
domain = email.split('@')[-1]
if domain in phishing_domains:
    print("Warning: Suspicious email domain detected!")
else:
    print("Email domain appears safe.")

Q2: Create a Bash script that logs failed login attempts to detect potential social engineering attacks.
Ans:
#!/bin/bash
echo "Monitoring failed login attempts..."
grep "Failed password" /var/log/auth.log > failed_logins.log
echo "Check failed_logins.log for details."

The document Assignment: Social Engineering Attacks | Ethical Hacking using Kali Linux (in English) - Software Development is a part of the Software Development Course Ethical Hacking using Kali Linux (in English).
All you need of Software Development at this link: Software Development
Are you preparing for Software Development Exam? Then you should check out the best video lectures, notes, free mock test series, crash course and much more provided by EduRev. You also get your detailed analysis and report cards along with 24x7 doubt solving for you to excel in Software Development exam. So join EduRev now and revolutionise the way you learn!
Sign up for Free Download App for Free
95 videos|6 docs

FAQs on Assignment: Social Engineering Attacks - Ethical Hacking using Kali Linux (in English) - Software Development

1. What are social engineering attacks?
Ans.Social engineering attacks are malicious strategies that manipulate individuals into divulging confidential or personal information, often by impersonating a trustworthy entity. These attacks exploit human psychology, making it easier for attackers to gain unauthorized access to systems or data.
2. What are some common types of social engineering attacks?
Ans.Common types of social engineering attacks include phishing (fraudulent emails or messages), pretexting (creating a fabricated scenario to obtain information), baiting (offering something enticing to lure victims), and tailgating (gaining physical access to a restricted area by following someone authorized).
3. How can individuals protect themselves from social engineering attacks?
Ans.Individuals can protect themselves by being cautious with unsolicited communications, verifying the identity of requesters before sharing information, using strong passwords, enabling two-factor authentication, and staying informed about common social engineering tactics.
4. What role does awareness play in preventing social engineering attacks?
Ans.Awareness is crucial in preventing social engineering attacks because it equips individuals with the knowledge to recognize suspicious behavior and tactics used by attackers. Regular training and education on cybersecurity can help build a culture of vigilance and reduce the likelihood of falling victim to these attacks.
5. How can organizations defend against social engineering attacks?
Ans.Organizations can defend against social engineering attacks by implementing comprehensive security policies, conducting regular employee training, establishing clear protocols for information sharing, and employing technical measures such as firewalls and intrusion detection systems to monitor and respond to suspicious activities.
Related Searches

Objective type Questions

,

Free

,

past year papers

,

Assignment: Social Engineering Attacks | Ethical Hacking using Kali Linux (in English) - Software Development

,

Assignment: Social Engineering Attacks | Ethical Hacking using Kali Linux (in English) - Software Development

,

Semester Notes

,

Exam

,

Previous Year Questions with Solutions

,

Summary

,

mock tests for examination

,

study material

,

shortcuts and tricks

,

Assignment: Social Engineering Attacks | Ethical Hacking using Kali Linux (in English) - Software Development

,

practice quizzes

,

ppt

,

MCQs

,

Viva Questions

,

Important questions

,

Sample Paper

,

Extra Questions

,

pdf

,

video lectures

;