Free CompTIA PenTest+ PT0-002: 04 Social Engineering – Free Anki Decks

Ref:📕CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition

PenTest+ (PT0-002) Chapter 04. Social Engineering Attacks

1 / 36

What are some of the actions that the Social-Engineer Toolkit (SET) can perform after a successful exploitation?

2 / 36

Which among the following call spoofing tools is capable of generating different background noises and sending calls straight to voicemail during social engineering attacks?

3 / 36

What is the definition of ’Social proof’ in the context of social engineering attacks?

4 / 36

Which social engineering influence technique involves manipulating the victim’s concern that a disadvantageous or harmful outcome may occur?

5 / 36

What are the post-exploitation activities that the Social-Engineer Toolkit (SET) allows?

6 / 36

What is the main purpose of a Universal Serial Bus (USB) drop key attack?

7 / 36

Which of the following is an effective measure against dumpster diving?

8 / 36

What is one way attackers can perform a badge cloning attack?

9 / 36

How can one help mitigate SMS phishing attacks?

10 / 36

What can the Social-Engineer Toolkit (SET) be used for?

11 / 36

Which call spoofing tool can be used to generate different background noises?

12 / 36

What is the method called when an attacker impersonates someone else in order to gain access to information?

13 / 36

What is a key feature of the Social-Engineer Toolkit (SET) in the context of Spear-Phishing attack vectors?

14 / 36

Which of the following prevention techniques is NOT effective against shoulder surfing social engineering attacks?

15 / 36

Which of the following best describes the function of the Social-Engineer Toolkit (SET) in penetration testing?

16 / 36

Which of the following call spoofing tools is a legitimate voice over IP (VoIP) management tool that can also be used to impersonate caller ID?

17 / 36

What is the primary purpose of a watering hole attack in the context of a computer network?

18 / 36

Which of the following is NOT a motivation technique/method of influence used by social engineers?

19 / 36

What is the difference between piggybacking and tailgating in the context of social engineering?

20 / 36

What type of attack would a penetration tester simulate in order to evaluate an organization’s physical security measures?

21 / 36

Which of the following call spoofing tools can be used to change your voice, record calls, generate different background noises, and send calls straight to voicemail?

22 / 36

Which of the following social engineering methods involves using the fear of losing out on an opportunity to manipulate the victim?

23 / 36

What sets whaling apart from other phishing attacks?

24 / 36

Which technique/method does a social engineer use to make a person act promptly by playing with their fears?

25 / 36

What is the purpose of the Browser Exploitation Framework (BeEF)?

26 / 36

What element does a social engineering attack primarily leverage?

27 / 36

Which of the following best describes the technique of pretexting in the context of social engineering attacks?

28 / 36

What is the main function of the Social-Engineer Toolkit (SET) in penetration testing?

29 / 36

Which of the following best describes how spear phishing operates according to the provided passage?

30 / 36

Which option should be selected in the Social-Engineer Toolkit (SET) to generate a normal PDF with an embedded EXE for a social engineering attack?

31 / 36

What is Vishing?

32 / 36

Which of the following methods is NOT known to be used by social engineers as a form of manipulation?

33 / 36

What is the purpose of using the Social-Engineer Toolkit (SET) in a social engineering attack?

34 / 36

What is pretexting in the context of social engineering attacks?

35 / 36

Which of the following statements about the Social-Engineer Toolkit (SET) is incorrect?

36 / 36

In the given email phishing example, why might the recipient be coaxed into disclosing their confidential information?

Your score is

Share the Post:

Download Your FREE CompTIA PenTest+(PT0-002) Anki Deck!

Email issues? [ [email protected] ]

Share the Post:

Develop your understanding of social engineering attacks with our CompTIA PenTest+ Chapter 04 practice questions.

This chapter explores the psychology behind attacks, common techniques, and preventive measures.
Gaining expertise in social engineering is essential for a well-rounded cybersecurity skill set. Enhance your study with our Free Anki decks.
For more information, visit CompTIA’s official page. Feel ready for the next challenge?

Proceed to Chapter 05: Exploiting Wired and Wireless Networks to continue your preparation.

Related Posts

RSS  
  • WGU Master’s Degree Rankings 2026 | I Asked 3 AIs 300 Times to Find the Best One
    Table of Contents Which WGU Master’s Degree Is Actually Worth It? If you’re considering a master’s degree from WGU and can’t figure out which program to choose — cybersecurity, software engineering, AI/ML, data analytics — you’re not alone. The options are overwhelming, and most comparisons online are either outdated or purely opinion-based. So here’s a […]
  • How I Made $1.3 Million in Cybersecurity (With Exact Revenue Numbers)
    Table of Contents If you’re stuck at $50K–$100K and wondering, “How the hell do people make seven figures?” this is for you.I’m Josh Madakor. In 2025, I made $1.3 million in cybersecurity. Not from a corporate job. Not from VC funding. And definitely not from selling a bullshit course.In this article, I’ll break down everything: […]
  • The Best Laptops for Cyber Security in 2026: Stop Over-Analyzing, Start Building
    Table of Contents Let’s be real: most people think that to get into cyber security, you need to be a “super elite hacker” running 10 different virtual machines on a glowing, heavy-duty gaming laptop. Spoiler alert: That’s just not how the industry works. I’ve spent years in roles ranging from Senior Analyst to Security Engineer, […]