1. Right Answer: A
Explanation: Phishing process is a technique in which Fake E-mail, which looks like legitimate E-mail, is sent to a target host. When the recipient opens the link, he is enticed to provide information.
2. Right Answer: D
Explanation: Social Engineering is an act of stealing information from humans. As it does not have any interaction with target system or network, it is considered as a non-technical attack.
3. Right Answer: A
Explanation: Human-based Social Engineering includes one-to-one interaction with the target. Social Engineer gathers sensitive information by tricking the users; for example, ensuring the trust, taking advantage of habits, behavior and moral obligation.
4. Right Answer: A
Explanation: Insider attack includes attacks performed by an employee of an organization, who has been paid for it to do so by the competitor or attacker, or a disgruntled employee.
5. Right Answer: B
Explanation: Spam filtering is a necessary step to avoid phishing email, which reduces the threat of unintentionally clicking on spam emails.