The correct answer is 'True'. Social engineering attacks exploit human psychology rather than technological weaknesses. Such attacks convince individuals to provide sensitive information, perform certain actions, or compromise security protocols which they otherwise might not. Examples of such behaviors include sharing passwords or allowing access to restricted areas. Other answers are incorrect as they either state the opposite or do not address the human-centric nature of social engineering.
Learn More
AI Generated Content may display inaccurate information, always double-check anything important.
What are some common techniques used in social engineering attacks?
How can individuals protect themselves from social engineering attacks?
What role does human psychology play in social engineering?