2/6/24, 21:27 Quiz - Social Engineering: Attempt review
FCF - Introduction to the Threat Landscape 2.0 Self-Paced
Started on Monday, June 3, 2024, 3:19 AM
State Finished
Completed on Monday, June 3, 2024, 3:25 AM
Time taken 5 mins 43 secs
Points 7/8
Grade 88 out of 100
Feedback Congratulations, you passed!
Question 1
Correct
1 points out of 1
Which two reasons explain why influence campaigns are often effective?
Select one or more:
The bad actor can remain anonymous using fake accounts
Social media offers an inexpensive means to influence a large number of people
People are known to respond favorably to a well-reasoned argument
Blackmail and bribery are effective in influencing people’s behavior
Question 2
Correct
1 points out of 1
Which attack vector does an influence campaign rely upon?
Select one:
Social media
Zero-trust software exploit
Email
Messaging service
https://training.fortinet.com/mod/quiz/review.php?attempt=19195683&cmid=483536 1/3
2/6/24, 21:27 Quiz - Social Engineering: Attempt review
Question 3
Correct
1 points out of 1
Which two insider types are considered malicious insider threats? (Choose two.)
Select one or more:
Pawns
Moles
Lone wolves
Rats
Question 4
Incorrect
0 points out of 1
What type of attack method is used by a blue hat to study the tactics of bad actors?
Select one:
Honeypot
Deception
Sandboxing
Waterholing
Question 5
Correct
1 points out of 1
Which description best explains pharming?
Select one:
Computer traffic redirected from a legitimate website to a malicious one
Exploiting an unknown vulnerability in computer software
Cultivating trust between a bad actor and the target through chance encounters
Recruiting employees through various means to carry out an insider attack
https://training.fortinet.com/mod/quiz/review.php?attempt=19195683&cmid=483536 2/3
2/6/24, 21:27 Quiz - Social Engineering: Attempt review
Question 6
Correct
1 points out of 1
Which definition best describes insider threat?
Select one:
A person posing a threat to an organization from within
An unknown vulnerability on a computer network
Employees who are angry at their employer
IT security fails to protect its network
Question 7
Correct
1 points out of 1
Which attack method relies on a telephone or voice-over-IP to target individuals or small groups, such as members of a finance department?
Select one:
Smishing
Vishing
Whaling
Honeypot
Question 8
Correct
1 points out of 1
What objective is accomplished by the last two stages of an influence campaign?
Select one:
Amplification of the message
Clarification of the narrative
Access to the target’s network
Theft of information or money
https://training.fortinet.com/mod/quiz/review.php?attempt=19195683&cmid=483536 3/3