Social Engineering
Manipulating individuals to gain unauthorized access.
Social Engineering is a manipulation technique that exploits human psychology rather than technical hacking methods to gain access to buildings, systems or data. In the CEH (Certified Ethical Hacker) framework, it's recognized as one of the most effective attack vectors because it targets the weake…
Concepts covered: Social Engineering Countermeasures, Social Engineering Concepts, Social Engineering Techniques, Insider Threats, Impersonation on Social Networking Sites, Identity Theft
CEH - Social Engineering Example Questions
Test your knowledge of Social Engineering
Question 1
During a security conference, a well-dressed individual approaches several attendees claiming to represent a cybersecurity startup. This person distributes free USB drives containing "exclusive security tools" and asks recipients to try them and provide feedback. The USB drives are branded with the conference logo. As a security professional, what is the most concerning aspect of this scenario?
Question 2
In social engineering, what is the term for a technique where an attacker follows an authorized person into a secured area by walking in behind them?
Question 3
During a security audit of a multinational corporation, you discover employees are vulnerable to shoulder surfing attacks where sensitive information is viewed by unauthorized individuals. Which countermeasure would most effectively mitigate this specific risk?