A type of attack that depends on human error rather than on vulnerabilities in the system.
Social Engineering attacks
A type of computer attack that in which the intruder engages with the targeted system is
known as _______________
Active Reconnaissance
Assessing security and auditing security mean the same thing.
False
Reconnaissance in information security is used for _______________
Information Gathering
Which of the following should be covered under the security policy?
All of these
Which among the following involves evaluating security against a standard to check for
complaince?
Securtiy Audits
The risk level decreases with increase in the likelihood of potential risk.
False
A process that aims to gain information about a system without directly engaging with the
system is known as _______________
Passive Reconnaissance
Which of the following is best used for penetration testing?
Black Box Testing
A continuous service that emulates real-world attackers for the purpose of improving the Blue
Team.

