An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario?
- urgency
- intimidation
- familiarity
- trusted partners
Explanation: Social engineering uses several different tactics to gain information from victims.
Exam with this question: Cybersecurity Essentials FINAL Quiz Answers Full Questions
Please login or Register to submit your answer