4. Social Engineering Attacks

  Ref:đź“•CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition
Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 04. Social Engineering Attacks

1 / 36

What is one way attackers can perform a badge cloning attack?

2 / 36

Which of the following is an effective measure against dumpster diving?

3 / 36

What can the Social-Engineer Toolkit (SET) be used for?

4 / 36

Which of the following statements about the Social-Engineer Toolkit (SET) is incorrect?

5 / 36

Which of the following is NOT a motivation technique/method of influence used by social engineers?

6 / 36

What is the main function of the Social-Engineer Toolkit (SET) in penetration testing?

7 / 36

What is Vishing?

8 / 36

What sets whaling apart from other phishing attacks?

9 / 36

Which option should be selected in the Social-Engineer Toolkit (SET) to generate a normal PDF with an embedded EXE for a social engineering attack?

10 / 36

What is pretexting in the context of social engineering attacks?

11 / 36

Which of the following best describes the function of the Social-Engineer Toolkit (SET) in penetration testing?

12 / 36

What is the purpose of using the Social-Engineer Toolkit (SET) in a social engineering attack?

13 / 36

Which of the following methods is NOT known to be used by social engineers as a form of manipulation?

14 / 36

What is the definition of ’Social proof’ in the context of social engineering attacks?

15 / 36

Which of the following prevention techniques is NOT effective against shoulder surfing social engineering attacks?

16 / 36

Which of the following social engineering methods involves using the fear of losing out on an opportunity to manipulate the victim?

17 / 36

Which technique/method does a social engineer use to make a person act promptly by playing with their fears?

18 / 36

What is a key feature of the Social-Engineer Toolkit (SET) in the context of Spear-Phishing attack vectors?

19 / 36

What are the post-exploitation activities that the Social-Engineer Toolkit (SET) allows?

20 / 36

What are some of the actions that the Social-Engineer Toolkit (SET) can perform after a successful exploitation?

21 / 36

In the given email phishing example, why might the recipient be coaxed into disclosing their confidential information?

22 / 36

What element does a social engineering attack primarily leverage?

23 / 36

Which of the following best describes how spear phishing operates according to the provided passage?

24 / 36

Which of the following call spoofing tools can be used to change your voice, record calls, generate different background noises, and send calls straight to voicemail?

25 / 36

Which of the following call spoofing tools is a legitimate voice over IP (VoIP) management tool that can also be used to impersonate caller ID?

26 / 36

What is the method called when an attacker impersonates someone else in order to gain access to information?

27 / 36

What is the primary purpose of a watering hole attack in the context of a computer network?

28 / 36

Which call spoofing tool can be used to generate different background noises?

29 / 36

What is the main purpose of a Universal Serial Bus (USB) drop key attack?

30 / 36

Which among the following call spoofing tools is capable of generating different background noises and sending calls straight to voicemail during social engineering attacks?

31 / 36

Which of the following best describes the technique of pretexting in the context of social engineering attacks?

32 / 36

What is the purpose of the Browser Exploitation Framework (BeEF)?

33 / 36

Which social engineering influence technique involves manipulating the victim’s concern that a disadvantageous or harmful outcome may occur?

34 / 36

How can one help mitigate SMS phishing attacks?

35 / 36

What type of attack would a penetration tester simulate in order to evaluate an organization’s physical security measures?

36 / 36

What is the difference between piggybacking and tailgating in the context of social engineering?

Your score is

Free CompTIA Pentest+ Anki decks are now available!

Click the download button after filling out the form below
to get your free practice exam Anki deck!

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image
Share the Post:

Related Posts

RSS  
  • Switching to IT or Cyber Security from Another Career
    Are you thinking about changing your career to IT or cyber security but worried about losing your current high salary? If yes, this guide is crafted just for you, especially if you have a family to support and don’t want to take a big pay cut. Understanding the Challenge A person reached out with a […]
  • How to Succeed in CySA+ Exam with Free Practice Questions
    Hey there! Are you getting ready for your CompTIA CySA+ exam? I’ve got great news for you! My team and I have created over a thousand practice questions to help you prepare, and they are all free! Keep reading to find out how these questions can help you pass with flying colors. What’s Available? **100% […]
  • From Call Center to IT Architect: Taylor’s Incredible Journey
    Introduction Today, we are going to share an amazing story about Taylor, who dramatically changed her career path from working in call centers to becoming an IT architect specialist. This journey is not just inspiring but also filled with practical tips and advice for anyone dreaming of making a big move in their career, especially […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!