Register
100:00
Stop
CISA - Protection of Information Assets - Security Event Management
Beginner
1/100
What is the primary characteristic of a 'Social Engineering' attack?
a.
Exploiting technological vulnerabilities in operating systems, applications, and network infrastructure to gain unauthorized access to protected resources and critical system functions
b.
Using specialized software to decode encrypted network transmissions and extract sensitive data from secure channels
c.
Manipulating people into divulging confidential information or performing actions that compromise security
d.
Implementing sophisticated algorithms that automatically identify and exploit authentication weaknesses in multi-factor identification systems
Beginner