Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISP Topic 3 Question 63 Discussion

Actual exam question for GIAC's GISP exam
Question #: 63
Topic #: 3
[All GISP Questions]

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Alpha
3 months ago
I bet the person who wrote this question has been the victim of a few social engineering scams. A and C all the way!
upvoted 0 times
...
Lavelle
3 months ago
Tricky one, but A and C are the social engineering attacks, no doubt about it. The others are more technical.
upvoted 0 times
Linn
2 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Sabrina
2 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Lelia
3 months ago
Ah, the old 'pretend to be someone important' trick. A and C are the way to go on this one.
upvoted 0 times
Lindsey
2 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beatriz
2 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Elke
3 months ago
Hmm, B and D seem more like network attacks than social engineering. A and C are the clear social engineering options.
upvoted 0 times
Katheryn
2 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beula
2 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Renea
4 months ago
Looks like the classic social engineering tricks. A and C are definitely the right answers here.
upvoted 0 times
Rosalind
3 months ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Jennie
3 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Glenna
4 months ago
I'm not sure about the answer. Can you explain why D is not a type of social engineering attack?
upvoted 0 times
...
Stephanie
4 months ago
I agree with Juliana. A and C both involve unauthorized persons pretending to be someone else to gain access.
upvoted 0 times
...
Juliana
4 months ago
I think the types of social engineering attacks are A and C.
upvoted 0 times
...

Save Cancel