CHAPTER 12

Low Tech: Social Engineering and Physical Security

This chapter includes questions from the following topics:

•   Define social engineering

•   Describe different types of social engineering techniques and attacks

•   Describe identity theft

•   List social engineering countermeasures

•   Describe physical security measures

I know a lot of people will pick up a book like this in an effort to train themselves to be a “hacker,” but I’ve got some news for you: you were already partway there. You’re a born social engineer, and you’ve most likely been doing some of this stuff since you could walk. In fact, I’ll bet serious cash you’ll probably employ at least some manipulation of your fellow human beings today, maybe without even thinking ...

Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.