New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISP Exam - Topic 3 Question 63 Discussion

Actual exam question for GIAC's GISP exam
Question #: 63
Topic #: 3
[All GISP Questions]

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Kenda
3 months ago
I disagree, D seems more like a technical attack than social engineering.
upvoted 0 times
...
Latanya
3 months ago
Wow, I didn't realize how sneaky these attacks can be!
upvoted 0 times
...
Christiane
3 months ago
I thought B was more about hacking than social engineering?
upvoted 0 times
...
Melissa
4 months ago
A is also a type of social engineering, right?
upvoted 0 times
...
Filiberto
4 months ago
Definitely C, that's classic social engineering!
upvoted 0 times
...
Geoffrey
4 months ago
I feel like option D is more about network attacks, so I wouldn't choose that one for social engineering.
upvoted 0 times
...
Earleen
4 months ago
I remember practicing a question similar to this, and I think option C is also a classic example of social engineering.
upvoted 0 times
...
Dante
4 months ago
I'm not so sure about option B; it sounds more like a technical attack rather than social engineering.
upvoted 0 times
...
Audry
5 months ago
I think option A is definitely a type of social engineering attack since it involves impersonation to gain access.
upvoted 0 times
...
Nobuko
5 months ago
This is a good one to practice. I'd say the key is identifying the attacks that rely on manipulating people rather than just technical vulnerabilities. A and C seem like the clear social engineering choices here.
upvoted 0 times
...
Isaac
5 months ago
I'm a bit confused by this question. I know social engineering is about exploiting people, but I'm not sure if all of these options qualify. I'll have to review my notes on the different types of social engineering attacks.
upvoted 0 times
...
Lauran
5 months ago
Okay, I've got this. A and C are definitely social engineering attacks where the attacker tricks people into giving up information or access. The other options seem more like technical attacks.
upvoted 0 times
...
Lashawnda
5 months ago
Hmm, this is a tricky one. I'm not sure if B and D would also be considered social engineering attacks. I'll have to think this through carefully.
upvoted 0 times
...
Georgiana
5 months ago
I'm pretty confident I know the answer to this one. Social engineering attacks are all about manipulating people, so I'd say A and C are the correct choices.
upvoted 0 times
...
Alpha
9 months ago
I bet the person who wrote this question has been the victim of a few social engineering scams. A and C all the way!
upvoted 0 times
...
Lavelle
9 months ago
Tricky one, but A and C are the social engineering attacks, no doubt about it. The others are more technical.
upvoted 0 times
Linn
9 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Sabrina
9 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Lelia
9 months ago
Ah, the old 'pretend to be someone important' trick. A and C are the way to go on this one.
upvoted 0 times
Lindsey
9 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beatriz
9 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Elke
10 months ago
Hmm, B and D seem more like network attacks than social engineering. A and C are the clear social engineering options.
upvoted 0 times
Katheryn
9 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beula
9 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Renea
10 months ago
Looks like the classic social engineering tricks. A and C are definitely the right answers here.
upvoted 0 times
Rosalind
9 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Jennie
10 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Glenna
11 months ago
I'm not sure about the answer. Can you explain why D is not a type of social engineering attack?
upvoted 0 times
...
Stephanie
11 months ago
I agree with Juliana. A and C both involve unauthorized persons pretending to be someone else to gain access.
upvoted 0 times
...
Juliana
11 months ago
I think the types of social engineering attacks are A and C.
upvoted 0 times
...

Save Cancel