4. Social Engineering Attacks

Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 04. Social Engineering Attacks

1 / 36

Which technique/method does a social engineer use to make a person act promptly by playing with their fears?

2 / 36

Which of the following best describes the function of the Social-Engineer Toolkit (SET) in penetration testing?

3 / 36

Which option should be selected in the Social-Engineer Toolkit (SET) to generate a normal PDF with an embedded EXE for a social engineering attack?

4 / 36

Which of the following prevention techniques is NOT effective against shoulder surfing social engineering attacks?

5 / 36

What is the main function of the Social-Engineer Toolkit (SET) in penetration testing?

6 / 36

Which call spoofing tool can be used to generate different background noises?

7 / 36

Which of the following best describes the technique of pretexting in the context of social engineering attacks?

8 / 36

Which of the following best describes how spear phishing operates according to the provided passage?

9 / 36

What is one way attackers can perform a badge cloning attack?

10 / 36

What is pretexting in the context of social engineering attacks?

11 / 36

How can one help mitigate SMS phishing attacks?

12 / 36

What is the difference between piggybacking and tailgating in the context of social engineering?

13 / 36

What element does a social engineering attack primarily leverage?

14 / 36

What is the purpose of the Browser Exploitation Framework (BeEF)?

15 / 36

What are the post-exploitation activities that the Social-Engineer Toolkit (SET) allows?

16 / 36

Which of the following call spoofing tools is a legitimate voice over IP (VoIP) management tool that can also be used to impersonate caller ID?

17 / 36

What is the definition of ’Social proof’ in the context of social engineering attacks?

18 / 36

What are some of the actions that the Social-Engineer Toolkit (SET) can perform after a successful exploitation?

19 / 36

What is a key feature of the Social-Engineer Toolkit (SET) in the context of Spear-Phishing attack vectors?

20 / 36

What can the Social-Engineer Toolkit (SET) be used for?

21 / 36

Which of the following social engineering methods involves using the fear of losing out on an opportunity to manipulate the victim?

22 / 36

Which among the following call spoofing tools is capable of generating different background noises and sending calls straight to voicemail during social engineering attacks?

23 / 36

In the given email phishing example, why might the recipient be coaxed into disclosing their confidential information?

24 / 36

Which of the following is NOT a motivation technique/method of influence used by social engineers?

25 / 36

Which of the following is an effective measure against dumpster diving?

26 / 36

What is the main purpose of a Universal Serial Bus (USB) drop key attack?

27 / 36

What is the purpose of using the Social-Engineer Toolkit (SET) in a social engineering attack?

28 / 36

Which of the following methods is NOT known to be used by social engineers as a form of manipulation?

29 / 36

Which of the following call spoofing tools can be used to change your voice, record calls, generate different background noises, and send calls straight to voicemail?

30 / 36

Which of the following statements about the Social-Engineer Toolkit (SET) is incorrect?

31 / 36

Which social engineering influence technique involves manipulating the victim’s concern that a disadvantageous or harmful outcome may occur?

32 / 36

What is the primary purpose of a watering hole attack in the context of a computer network?

33 / 36

What type of attack would a penetration tester simulate in order to evaluate an organization’s physical security measures?

34 / 36

What is Vishing?

35 / 36

What sets whaling apart from other phishing attacks?

36 / 36

What is the method called when an attacker impersonates someone else in order to gain access to information?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Pentest+ Anki deck.

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image

Develop your understanding of social engineering attacks with our CompTIA PenTest+ Chapter 04 practice questions.

This chapter explores the psychology behind attacks, common techniques, and preventive measures.
Gaining expertise in social engineering is essential for a well-rounded cybersecurity skill set. Enhance your study with our free Anki decks.
For more information, visit CompTIA’s official page. Feel ready for the next challenge?

Proceed to Chapter 05: Exploiting Wired and Wireless Networks to continue your preparation.

 

Explore our other free practice tests:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!