Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISP Topic 3 Question 63 Discussion

Actual exam question for GIAC's GISP exam
Question #: 63
Topic #: 3
[All GISP Questions]

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Alpha
26 days ago
I bet the person who wrote this question has been the victim of a few social engineering scams. A and C all the way!
upvoted 0 times
...
Lavelle
27 days ago
Tricky one, but A and C are the social engineering attacks, no doubt about it. The others are more technical.
upvoted 0 times
Linn
14 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Sabrina
17 days ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Lelia
28 days ago
Ah, the old 'pretend to be someone important' trick. A and C are the way to go on this one.
upvoted 0 times
Lindsey
15 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beatriz
19 days ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Elke
1 months ago
Hmm, B and D seem more like network attacks than social engineering. A and C are the clear social engineering options.
upvoted 0 times
Katheryn
9 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beula
14 days ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Renea
2 months ago
Looks like the classic social engineering tricks. A and C are definitely the right answers here.
upvoted 0 times
Rosalind
26 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Jennie
1 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Glenna
2 months ago
I'm not sure about the answer. Can you explain why D is not a type of social engineering attack?
upvoted 0 times
...
Stephanie
2 months ago
I agree with Juliana. A and C both involve unauthorized persons pretending to be someone else to gain access.
upvoted 0 times
...
Juliana
2 months ago
I think the types of social engineering attacks are A and C.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77