Social engineering Quiz

1. What is the primary vulnerability that social engineering exploits within organizations?

2. Which stage of a social engineering attack involves gathering information from public profiles?

3. What is 'vishing' in the context of social engineering?

4. Which social engineering tactic involves attackers creating fake personas to form relationships with targets?

5. What is a key strategy for enhancing security against social engineering attacks?