Which of these would be the best description of social engineering?
A) Guessing a password based on the most common options
B) Impersonating a help desk technician over the phone
C) Installing malware that is invisible to the operating system
D) Malware that self-replicates between computers
E) Viewing another user’s computer screen from a distance
F) Building a bridge full of socials
The answer: B) Impersonating a help desk technician over the phone
Social engineering manipulates people to circumvent security controls. One common method of social engineering is impersonating a trusted authority to gain access to information.
Want to know more? Watch “Common Security Threats.”
There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.