Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISP Topic 3 Question 63 Discussion

Actual exam question for GIAC's GISP exam
Question #: 63
Topic #: 3
[All GISP Questions]

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Alpha
28 days ago
I bet the person who wrote this question has been the victim of a few social engineering scams. A and C all the way!
upvoted 0 times
...
Lavelle
29 days ago
Tricky one, but A and C are the social engineering attacks, no doubt about it. The others are more technical.
upvoted 0 times
Linn
16 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Sabrina
19 days ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Lelia
1 months ago
Ah, the old 'pretend to be someone important' trick. A and C are the way to go on this one.
upvoted 0 times
Lindsey
17 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beatriz
21 days ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Elke
1 months ago
Hmm, B and D seem more like network attacks than social engineering. A and C are the clear social engineering options.
upvoted 0 times
Katheryn
11 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Beula
16 days ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Renea
2 months ago
Looks like the classic social engineering tricks. A and C are definitely the right answers here.
upvoted 0 times
Rosalind
28 days ago
C) An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.
upvoted 0 times
...
Jennie
2 months ago
A) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.
upvoted 0 times
...
...
Glenna
2 months ago
I'm not sure about the answer. Can you explain why D is not a type of social engineering attack?
upvoted 0 times
...
Stephanie
2 months ago
I agree with Juliana. A and C both involve unauthorized persons pretending to be someone else to gain access.
upvoted 0 times
...
Juliana
2 months ago
I think the types of social engineering attacks are A and C.
upvoted 0 times
...

Save Cancel