IT Questions Bank Which tool can launch social engineering attacks and be integrated with third-party tools and frameworks such as Metasploit?ITExamAnswers asked 10 months ago • Ethical HackerWhich resource would mitigate piggybacking and tailgating?ITExamAnswers asked 10 months ago • Ethical HackerWhich two access control options are commonly used in conjunction with access control vestibules? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat two physical attacks are mitigated by using access control vestibules? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich Apple iOS and Android tool can be used to spoof a phone number?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool provides a threat actor a web console to manipulate users who are victims of cross-site scripting (XSS) attacks?ITExamAnswers asked 10 months ago • Ethical HackerWhich social engineering physical attack statement is correct?ITExamAnswers asked 10 months ago • Ethical HackerA threat actor has sent a phishing email to a victim stating that suspicious activity has been detected on their bank account and that they must immediately click on a provided link to change their password. What method of influence is being used by the threat actor?ITExamAnswers asked 10 months ago • Ethical HackerApple is a company constantly working towards making its products and processes more environmentally friendly. Therefore, the Apple brand is associated with ideals and values that customers can relate to and support. What method of influence is being used by Apple?ITExamAnswers asked 10 months ago • Ethical HackerWhat method of influence is characterized when a celebrity endorses a product on social media?ITExamAnswers asked 10 months ago • Ethical HackerA salesperson is attempting to convince a customer to buy a product because limited supplies are available. Which social engineering method of influence is being used by the salesperson?ITExamAnswers asked 10 months ago • Ethical HackerWhich option is a voice over IP management tool that can be used to impersonate caller ID?ITExamAnswers asked 10 months ago • Ethical HackerWhy would a threat actor use the Social-Engineering Toolkit (SET)?ITExamAnswers asked 10 months ago • Ethical HackerA threat actor has altered the host file for a commonly accessed website on the computer of a victim. Now when the user clicks on the website link, they are redirected to a malicious website. What type of attack has the threat actor accomplished?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the act of gaining knowledge or information from a victim without directly asking for that particular information?ITExamAnswers asked 10 months ago • Ethical Hacker