Free CompTIA PenTest+ PT0-002: 04 Social Engineering – Free Anki Decks

Ref:📕CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition

PenTest+ (PT0-002) Chapter 04. Social Engineering Attacks

1 / 36

Which of the following is NOT a motivation technique/method of influence used by social engineers?

2 / 36

Which of the following is an effective measure against dumpster diving?

3 / 36

What is pretexting in the context of social engineering attacks?

4 / 36

What is the purpose of the Browser Exploitation Framework (BeEF)?

5 / 36

What is Vishing?

6 / 36

Which of the following best describes the function of the Social-Engineer Toolkit (SET) in penetration testing?

7 / 36

How can one help mitigate SMS phishing attacks?

8 / 36

What is the main function of the Social-Engineer Toolkit (SET) in penetration testing?

9 / 36

Which of the following statements about the Social-Engineer Toolkit (SET) is incorrect?

10 / 36

What is a key feature of the Social-Engineer Toolkit (SET) in the context of Spear-Phishing attack vectors?

11 / 36

Which of the following prevention techniques is NOT effective against shoulder surfing social engineering attacks?

12 / 36

What are some of the actions that the Social-Engineer Toolkit (SET) can perform after a successful exploitation?

13 / 36

Which of the following call spoofing tools can be used to change your voice, record calls, generate different background noises, and send calls straight to voicemail?

14 / 36

Which of the following social engineering methods involves using the fear of losing out on an opportunity to manipulate the victim?

15 / 36

Which social engineering influence technique involves manipulating the victim’s concern that a disadvantageous or harmful outcome may occur?

16 / 36

Which technique/method does a social engineer use to make a person act promptly by playing with their fears?

17 / 36

What element does a social engineering attack primarily leverage?

18 / 36

What are the post-exploitation activities that the Social-Engineer Toolkit (SET) allows?

19 / 36

Which of the following methods is NOT known to be used by social engineers as a form of manipulation?

20 / 36

What is the main purpose of a Universal Serial Bus (USB) drop key attack?

21 / 36

Which option should be selected in the Social-Engineer Toolkit (SET) to generate a normal PDF with an embedded EXE for a social engineering attack?

22 / 36

What type of attack would a penetration tester simulate in order to evaluate an organization’s physical security measures?

23 / 36

Which call spoofing tool can be used to generate different background noises?

24 / 36

What is one way attackers can perform a badge cloning attack?

25 / 36

Which among the following call spoofing tools is capable of generating different background noises and sending calls straight to voicemail during social engineering attacks?

26 / 36

In the given email phishing example, why might the recipient be coaxed into disclosing their confidential information?

27 / 36

What is the definition of ’Social proof’ in the context of social engineering attacks?

28 / 36

Which of the following call spoofing tools is a legitimate voice over IP (VoIP) management tool that can also be used to impersonate caller ID?

29 / 36

What can the Social-Engineer Toolkit (SET) be used for?

30 / 36

Which of the following best describes how spear phishing operates according to the provided passage?

31 / 36

What is the primary purpose of a watering hole attack in the context of a computer network?

32 / 36

What is the method called when an attacker impersonates someone else in order to gain access to information?

33 / 36

What is the purpose of using the Social-Engineer Toolkit (SET) in a social engineering attack?

34 / 36

Which of the following best describes the technique of pretexting in the context of social engineering attacks?

35 / 36

What sets whaling apart from other phishing attacks?

36 / 36

What is the difference between piggybacking and tailgating in the context of social engineering?

Your score is

Share the Post:
Previous slide
Next slide

Fill up to receive the FREE CompTIA PenTest+ deck!

* indicates required
Share the Post:

Develop your understanding of social engineering attacks with our CompTIA PenTest+ Chapter 04 practice questions.

This chapter explores the psychology behind attacks, common techniques, and preventive measures.
Gaining expertise in social engineering is essential for a well-rounded cybersecurity skill set. Enhance your study with our Free Anki decks.
For more information, visit CompTIA’s official page. Feel ready for the next challenge?

Proceed to Chapter 05: Exploiting Wired and Wireless Networks to continue your preparation.

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]