GIAC Foundational Cybersecurity Technologies Practice Test

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the GIAC Foundational Cybersecurity Technologies Test. Utilize flashcards and multiple-choice questions, each with detailed hints and explanations to excel. Boost your readiness for the exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What distinguishes phishing from other types of social engineering attacks?

  1. Targeting specific individuals

  2. Utilizing emails to deceive the user

  3. In-person manipulation

  4. Being purely physical attacks

The correct answer is: Utilizing emails to deceive the user

Phishing is distinctly characterized by its reliance on emails as the primary medium for deceiving individuals. This method typically involves attackers sending fraudulent messages that appear to originate from legitimate sources, such as banks or popular online services, with the intent to trick recipients into providing sensitive information like passwords or credit card numbers. The essence of phishing lies in this digital deception through communication channels that many individuals interact with regularly. While targeting specific individuals is a feature of some phishing attempts, such as spear phishing, phishing generally addresses a broader audience by casting a wide net. In-person manipulation refers to techniques like pretexting or baiting, which are separate forms of social engineering not connected to phishing. Similarly, purely physical attacks, such as tailgating or physical theft, do not relate to phishing, which fundamentally involves an online component. Thus, the emphasis on emails in phishing sets it apart from other social engineering tactics.