Medium1 markMultiple Choice
CPA · Question 77 · Area II: Security
Which of the following is a 'Social Engineering' technique?
Which of the following is a 'Social Engineering' technique?
Answer options:
A.
Brute Force Attack
B.
Buffer Overflow
C.
Pretexting
D.
Port Scanning
How to approach this question
Identify the 'Human Con' game.
Full Answer
C.Pretexting✓ Correct
C
Pretexting is a form of social engineering where an attacker creates a fabricated scenario (the pretext) to manipulate a victim into divulging information or performing an action.
Common mistakes
Confusing technical attacks with social attacks.
Practice the full CPA ISC Practice Exam 3
82 questions · hints · full answers · grading
More questions from this exam
Q01A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud-based s...MediumQ02During a review of a client's cloud governance structure, an auditor notes that the client uses a...MediumQ03An auditor is evaluating the 'Processing Integrity' principle for a financial institution's loan ...HardQ04A company uses a batch processing system to update inventory records overnight. The 'Grandfather-...HardQ05During a walkthrough of the change management process, an auditor observes that the 'Developer' r...Medium
Expert