Exercise

  1. Write a short note on social engineering.
  2. Why and how social engineering attacks take place?
  3. What are phishing attacks? Write a short note on it.
  4. Define spear phishing.
  5. What is pretexting?
  6. What is scareware? Define it.
  7. What is access tailgating? Define it.
  8. Describe how psychological manipulation and trust factors play a role in social engineering?
  9. How open source intelligence can be used for social engineering? Explain it.
  10. Explain with an example how social engineering attacks take place?