The correct answer is 'True'. Social engineering attacks exploit human psychology rather than technological weaknesses. Such attacks convince individuals to provide sensitive information, perform certain actions, or compromise security protocols which they otherwise might not. Examples of such behaviors include sharing passwords or allowing access to restricted areas. Other answers are incorrect as they either state the opposite or do not address the human-centric nature of social engineering.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common techniques used in social engineering attacks?
Open an interactive chat with Bash
How can individuals protect themselves from social engineering attacks?
Open an interactive chat with Bash
What role does human psychology play in social engineering?