Identifying and Combating Social Engineering Attacks
Content by Qstream
In the increasingly connected digital world, every office worker is a potential target for social engineering attacks. This interactive, scenario-based learning experience empowers you with the knowledge and skills to recognize and respond to a variety of social engineering tactics effectively. You’ll delve into the psychology behind these attacks, learn to spot red flags in communications and practice proactive measures to enhance your digital security.
Category:Safety and Risk ManagementWorkplace Tools & Skills
Industry:All Industries
Questions: 15
FREE
Content Preview
Identifying and Combating Social Engineering Attacks
With this Qstream module, you’ll understand the crucial role of incident reporting in safeguarding your organization’s information assets. Step into this immersive learning journey and become the human firewall your organization needs. Remember, in the battle against cyber threats, you are the first line of defense!
Click on each title to preview the question in the mobile/desktop widget.
1. What is Social Engineering? >
2. Common Forms of Social Engineering Attacks >
3. Intricate Social Engineering Schemes >
4. ID Phishing Attacks >
5. Pretexting in Communication >
6. Understanding Baiting Tactics >
7. Suspicious Requests in Communications >
8. Suspicious Email Content >
9. Malicious Email Attachments >
10. Prevent Social Engineering Attacks >
11. Secure Password Practices >
12. Reacting to a Suspicious Email >
13. Actions to Take After an Attempt >
14. Taking Action on a Complex Attempt >
15. Handling an Unexpected Call >
Follow the interactions on each screen to answer Qstream questions as a Participant.
Which of the following best describes social engineering in the context of information security?
Answer explanation:
Social engineering in information security refers to deceptive tactics that manipulate individuals into revealing confidential information. These tactics often exploit human psychology and can take various forms, from impersonating trustworthy figures to creating scenarios of urgency.
Which of the following are common forms of social engineering attacks?
Answer explanation:
Social engineering attacks focus on exploiting human behavior and trust, such as in phishing and pretexting. Phishing typically involves deceptive emails that mimic legitimate organizations to trick individuals into revealing sensitive data. Pretexting uses fabricated scenarios to persuade victims to divulge information.
On the contrary, malware and ransomware are types of malicious software that compromise computer systems. While they can be disseminated through social engineering tactics, they are not social engineering methods themselves.
Meanwhile, encryption and hashing are cryptographic techniques used to safeguard data, not to manipulate individuals into disclosing information.
Lastly, firewalls and intrusion detection systems are protective measures used to ward off unauthorized access and detect potential threats. These are components of a cybersecurity framework, not social engineering techniques.
By understanding the essence of social engineering attacks—manipulating human behaviors and trust—we can better recognize and resist them.
Imagine you receive a phone call from someone claiming to be a pollster from a reputable research firm. The caller informs you they're conducting a survey on customer satisfaction in the banking sector. They inquire about your experiences, favorite banking services, and subtly shift the conversation to more personal questions about your accounts. Over the course of the conversation, they build rapport, making you feel comfortable. As the call progresses, they casually slip in a question about your account details, promising the information would be used strictly for research purposes.
This social engineering attack can be described as which of the following?
Answer explanation:
The situation described is a classic example of pretexting, a form of social engineering. Unlike phishing, which typically involves impersonating an entity to trick you into revealing sensitive data, pretexting is a step further: it involves establishing trust and rapport with the target before subtly shifting the conversation to extract valuable information.
In this scenario, the person posing as a pollster tries to build trust, using a seemingly innocent conversation about banking experiences as a pretext to solicit sensitive information.
If you encounter such a situation, it's crucial to remember never to disclose personal or financial information to unverified sources. Even seemingly harmless information can be valuable in social engineering attacks. If you suspect such an attempt, immediately end the conversation, and report the incident to your bank's security department through their official and trusted channels. This approach is essential in protecting your personal and financial information from potential threats.
You receive an email from your company's IT department stating that they need to perform an emergency update on your system and need your login credentials to proceed. You didn't receive any prior communication about this update.
This type of social engineering attack is most likely which of the following?
Answer explanation:
This situation is most indicative of a phishing attack, a form of social engineering where an attacker pretends to be a reputable entity in order to gather sensitive information. Phishing attacks often exploit the element of trust and use it to deceive individuals into revealing confidential data like login credentials.
In this case, the sender is impersonating your IT department and creating a sense of urgency by saying they need to perform an 'emergency update'. But it's crucial to remember that legitimate organizations, especially IT departments, rarely, if ever, ask for sensitive information like passwords through email.
If you encounter such a situation, the best course of action is to not reply to the email or click any included links. Instead, contact your IT department directly using known and trusted contact methods to verify the legitimacy of the request. This incident should also be reported so the potential security threat can be addressed.
By being cautious about unsolicited requests for sensitive information and always double-checking, you can help protect both yourself and your organization from phishing attempts.
A caller claiming to be from the company's HR department asks for your personal details to 'update their records'. They even discuss some recent company events to establish credibility. However, you feel suspicious, as the HR department usually sends such requests via email.
Which of the following types of social engineering is likely being attempted here?
Answer explanation:
The situation described is a classic example of pretexting. In pretexting, the attacker creates a plausible excuse, or pretext, to ask for the information they want. They often pretend to need the information for legitimate reasons, such as the 'record updating' mentioned in the scenario.
It's crucial not to give out personal details over the phone unless you can verify the caller's identity. If you find yourself in a similar situation, take the caller's name, hang up, and call back the official number for your HR department to verify the call's authenticity. This way, you ensure you are not divulging critical information to potential attackers. Remember, being vigilant and taking a moment to verify can save you from potential security risks.
Which of the following best describes the social engineering tactic known as 'baiting'?
Answer explanation:
'Baiting' is a specific form of social engineering that exploits human curiosity and greed. It involves offering a false promise of free goods or benefits to encourage individuals to share personal or confidential information. It often appears as an irresistible offer that's too good to be true, such as free downloads of movies, music, or software.
This tactic differs from the other options listed.
• “Creating a false scenario to convince someone to divulge information” refers to 'pretexting,' where an attacker creates a convincing false scenario to elicit information.
• “Using flattery or authority to manipulate someone into revealing confidential data” describes 'influence tactics,' using flattery or authority to manipulate someone into revealing data.
• “Impersonating a trusted individual or entity to request confidential information” corresponds to 'phishing,' where the attacker impersonates a trusted entity to trick the victim into sharing confidential information.
Remember, if something seems too good to be true, it probably is. Always verify any suspicious offers and never provide personal or sensitive information without complete assurance of the requester's authenticity.
An external supplier, with whom your company regularly works, sends an email urgently requesting payment to a new bank account due to "accounting changes." The email is worded professionally, but it unexpectedly came without prior notice or official letterhead.
You should do which of the following?
Answer explanation:
This situation has potential signs of a social engineering attempt known as invoice fraud. Despite the urgency and familiarity with the supplier, the absence of official letterhead and abrupt change of bank account details are suspicious.
The appropriate action would be to verify the information independently before proceeding. You should contact the supplier directly using previously known and verified contact information, not the contact information provided in the suspicious email, to confirm if the bank details have genuinely changed. This approach can prevent potential financial loss and data breach.
Which of the following attributes could indicate a potentially malicious email?
Answer explanation:
Malicious emails often include several common indicators or "red flags." These might include being sent outside of regular business hours, suggesting that the sender may be operating in a different time zone. Spelling and grammatical errors can be common, as attackers may not pay careful attention to language usage, or they may not be native speakers of the email's language. Generic greetings are often used in phishing attempts, as the same email is sent en masse to many recipients.
If learners receive an email that they suspect is malicious or a phishing attempt, they should follow these steps:
1. Do not interact with the email: This means not clicking any links, downloading any attachments, or responding to the email in any way.
2. Verify the sender: If the email claims to be from a known entity like your bank or workplace, contact that organization directly using a trusted method (like the contact information listed on their official website), not the contact information provided in the suspicious email.
3. Report the email: Notify your IT or security department about the suspicious email. They can help confirm whether it's a threat and take appropriate measures. If the email pretends to be from an external organization like a bank, report the email to them as well.
Although it's possible for a colleague's email to be compromised, emails from trusted colleagues are typically safe. The use of very formal language and correct grammar does not necessarily indicate a malicious email, since professional communication often includes these elements. Therefore, while it's important to be vigilant, these attributes alone should not cause alarm.
You receive an email from a client you've been expecting to hear from. The email contains an attachment that you weren't expecting, and the email message is vague. The appropriate course of action is to do which of the following?
Answer explanation:
Unexpected or vague email attachments are potential security risks, even if they seem to come from known contacts. The best course of action is to seek clarity from the client (using the email that you have on file, if different than the sender email with the attachment) before opening the attachment.
If you cannot verify the sender's intent, do not open the attachment, and report the incident to your IT or security department.
Proactive steps to help prevent social engineering attacks include which of the following?
Answer explanation:
Regular software and operating system updates, as well as vigilant verification of unsolicited communications, are critical steps in preventing social engineering attacks.
Sharing passwords, even with trusted colleagues, and clicking links to validate sources are practices that can put you and your company’s security at risk.
It is important to use different passwords for different accounts for which of the following reasons?
Answer explanation:
Using different passwords for different accounts is a critical security practice because it helps limit damage in case one of your accounts is compromised. If you use the same password for all accounts, a breach of one could lead to a breach of all.
You receive an unexpected email that appears to be from your manager. The email requests your login credentials to access a report they urgently need. The email has a tone of urgency, and the sender's email address appears slightly different from your manager's usual email address.
The best course of action is to do which of the following?
Answer explanation:
The situation described is a common setup for a phishing attempt, a type of social engineering attack. Here, the attacker is impersonating a trusted figure (your manager) to manipulate you into revealing sensitive information (your login credentials). Key red flags include the unexpected nature of the request, the sense of urgency, and the irregularity in the sender's email address.
The correct course of action in such situations is to independently verify the request using a known, trusted contact method - in this case, by calling your manager directly. This will allow you to confirm the legitimacy of the request and prevent potential breaches. Always remember, it's better to verify first before acting on suspicious or unexpected requests.
Which of the following are appropriate actions to take if you believe your computer has been compromised in a social engineering attempt?
Answer explanation:
If you suspect your computer has been compromised due to a social engineering attempt, the most appropriate first steps are to alert your supervisor and the IT security department and to disconnect your computer system from the network.
Alerting the proper channels in your organization is vital for two main reasons:
1. ensure that trained professionals can initiate incident response procedures, and
2. heighten the organization's awareness and potentially prevent others from falling for the same attack.
Disconnecting your system from the network is an important step to contain the potential threat. By doing this, you prevent any potential malware from spreading across the network or any sensitive data from being transmitted back to the attacker.
You receive an email from an unknown sender claiming they've been contracted by your company to conduct a system upgrade. The email contains detailed technical jargon and states that your input is critical to the upgrade process. The sender asks for your login credentials to conduct a 'system compatibility check.' There is an air of urgency, but the sender does mention that if you have concerns, you can reach out to a person who is, in fact, your company's IT head, but on a non-business phone number.
Your immediate course of action is to do which of the following?
Answer explanation:
This scenario represents a sophisticated social engineering attempt. It's characterized by complex technical language and contextually relevant details, which may cause recipients to overlook the usual warning signs. The request for login credentials, the pressure of urgency, and the unusual communication channel (non-business phone number) for verification are all red flags.
In such cases, the immediate course of action should be to report the incident to your immediate supervisor and your organization's official IT security department. You should refrain from further engagement with the sender or any unofficial communication channels mentioned in the suspicious email. The appropriate department will handle the situation and take the necessary steps to investigate and mitigate any potential threats.
You receive a call from a person who identifies themselves as a member of your organization's IT department. The caller tells you they have been monitoring unusual activity on your network and believes your computer has been compromised. They ask you to install a particular 'security' software to help them track the 'intruder.'
While the caller does not request any personal information directly, they insist on immediate action to prevent significant data loss. The caller suggests that if you are uncomfortable installing the software, you can contact your direct supervisor on a mobile number, which you notice is different from the one you have on record. The caller also tells you that your supervisor who has been informed of the situation.
Your immediate course of action should be to do which of the following?
Answer explanation:
The scenario presents a highly sophisticated social engineering attempt that uses the perceived authority of the IT department and the urgency of a security breach to manipulate you into taking action that could potentially compromise the security of your computer and network.
Your immediate response should be to disconnect the call without taking any proposed action. It's important not to follow instructions or act on information given by an unverified source, especially when they involve installing software or contacting someone via an unofficial channel. Instead, report the incident to your immediate supervisor and your organization's official IT security department using verified contact details. They can assess the situation and take the appropriate steps to safeguard against potential threats.
Which of the following best describes social engineering in the context of information security?
Answer explanation:
Social engineering in information security refers to deceptive tactics that manipulate individuals into revealing confidential information. These tactics often exploit human psychology and can take various forms, from impersonating trustworthy figures to creating scenarios of urgency.
Which of the following are common forms of social engineering attacks?
Answer explanation:
Social engineering attacks focus on exploiting human behavior and trust, such as in phishing and pretexting. Phishing typically involves deceptive emails that mimic legitimate organizations to trick individuals into revealing sensitive data. Pretexting uses fabricated scenarios to persuade victims to divulge information.
On the contrary, malware and ransomware are types of malicious software that compromise computer systems. While they can be disseminated through social engineering tactics, they are not social engineering methods themselves.
Meanwhile, encryption and hashing are cryptographic techniques used to safeguard data, not to manipulate individuals into disclosing information.
Lastly, firewalls and intrusion detection systems are protective measures used to ward off unauthorized access and detect potential threats. These are components of a cybersecurity framework, not social engineering techniques.
By understanding the essence of social engineering attacks—manipulating human behaviors and trust—we can better recognize and resist them.
Imagine you receive a phone call from someone claiming to be a pollster from a reputable research firm. The caller informs you they're conducting a survey on customer satisfaction in the banking sector. They inquire about your experiences, favorite banking services, and subtly shift the conversation to more personal questions about your accounts. Over the course of the conversation, they build rapport, making you feel comfortable. As the call progresses, they casually slip in a question about your account details, promising the information would be used strictly for research purposes.
This social engineering attack can be described as which of the following?
Answer explanation:
The situation described is a classic example of pretexting, a form of social engineering. Unlike phishing, which typically involves impersonating an entity to trick you into revealing sensitive data, pretexting is a step further: it involves establishing trust and rapport with the target before subtly shifting the conversation to extract valuable information.
In this scenario, the person posing as a pollster tries to build trust, using a seemingly innocent conversation about banking experiences as a pretext to solicit sensitive information.
If you encounter such a situation, it's crucial to remember never to disclose personal or financial information to unverified sources. Even seemingly harmless information can be valuable in social engineering attacks. If you suspect such an attempt, immediately end the conversation, and report the incident to your bank's security department through their official and trusted channels. This approach is essential in protecting your personal and financial information from potential threats.
You receive an email from your company's IT department stating that they need to perform an emergency update on your system and need your login credentials to proceed. You didn't receive any prior communication about this update.
This type of social engineering attack is most likely which of the following?
Answer explanation:
This situation is most indicative of a phishing attack, a form of social engineering where an attacker pretends to be a reputable entity in order to gather sensitive information. Phishing attacks often exploit the element of trust and use it to deceive individuals into revealing confidential data like login credentials.
In this case, the sender is impersonating your IT department and creating a sense of urgency by saying they need to perform an 'emergency update'. But it's crucial to remember that legitimate organizations, especially IT departments, rarely, if ever, ask for sensitive information like passwords through email.
If you encounter such a situation, the best course of action is to not reply to the email or click any included links. Instead, contact your IT department directly using known and trusted contact methods to verify the legitimacy of the request. This incident should also be reported so the potential security threat can be addressed.
By being cautious about unsolicited requests for sensitive information and always double-checking, you can help protect both yourself and your organization from phishing attempts.
A caller claiming to be from the company's HR department asks for your personal details to 'update their records'. They even discuss some recent company events to establish credibility. However, you feel suspicious, as the HR department usually sends such requests via email.
Which of the following types of social engineering is likely being attempted here?
Answer explanation:
The situation described is a classic example of pretexting. In pretexting, the attacker creates a plausible excuse, or pretext, to ask for the information they want. They often pretend to need the information for legitimate reasons, such as the 'record updating' mentioned in the scenario.
It's crucial not to give out personal details over the phone unless you can verify the caller's identity. If you find yourself in a similar situation, take the caller's name, hang up, and call back the official number for your HR department to verify the call's authenticity. This way, you ensure you are not divulging critical information to potential attackers. Remember, being vigilant and taking a moment to verify can save you from potential security risks.
Which of the following best describes the social engineering tactic known as 'baiting'?
Answer explanation:
'Baiting' is a specific form of social engineering that exploits human curiosity and greed. It involves offering a false promise of free goods or benefits to encourage individuals to share personal or confidential information. It often appears as an irresistible offer that's too good to be true, such as free downloads of movies, music, or software.
This tactic differs from the other options listed.
• “Creating a false scenario to convince someone to divulge information” refers to 'pretexting,' where an attacker creates a convincing false scenario to elicit information.
• “Using flattery or authority to manipulate someone into revealing confidential data” describes 'influence tactics,' using flattery or authority to manipulate someone into revealing data.
• “Impersonating a trusted individual or entity to request confidential information” corresponds to 'phishing,' where the attacker impersonates a trusted entity to trick the victim into sharing confidential information.
Remember, if something seems too good to be true, it probably is. Always verify any suspicious offers and never provide personal or sensitive information without complete assurance of the requester's authenticity.
An external supplier, with whom your company regularly works, sends an email urgently requesting payment to a new bank account due to "accounting changes." The email is worded professionally, but it unexpectedly came without prior notice or official letterhead.
You should do which of the following?
Answer explanation:
This situation has potential signs of a social engineering attempt known as invoice fraud. Despite the urgency and familiarity with the supplier, the absence of official letterhead and abrupt change of bank account details are suspicious.
The appropriate action would be to verify the information independently before proceeding. You should contact the supplier directly using previously known and verified contact information, not the contact information provided in the suspicious email, to confirm if the bank details have genuinely changed. This approach can prevent potential financial loss and data breach.
Which of the following attributes could indicate a potentially malicious email?
Answer explanation:
Malicious emails often include several common indicators or "red flags." These might include being sent outside of regular business hours, suggesting that the sender may be operating in a different time zone. Spelling and grammatical errors can be common, as attackers may not pay careful attention to language usage, or they may not be native speakers of the email's language. Generic greetings are often used in phishing attempts, as the same email is sent en masse to many recipients.
If learners receive an email that they suspect is malicious or a phishing attempt, they should follow these steps:
1. Do not interact with the email: This means not clicking any links, downloading any attachments, or responding to the email in any way.
2. Verify the sender: If the email claims to be from a known entity like your bank or workplace, contact that organization directly using a trusted method (like the contact information listed on their official website), not the contact information provided in the suspicious email.
3. Report the email: Notify your IT or security department about the suspicious email. They can help confirm whether it's a threat and take appropriate measures. If the email pretends to be from an external organization like a bank, report the email to them as well.
Although it's possible for a colleague's email to be compromised, emails from trusted colleagues are typically safe. The use of very formal language and correct grammar does not necessarily indicate a malicious email, since professional communication often includes these elements. Therefore, while it's important to be vigilant, these attributes alone should not cause alarm.
You receive an email from a client you've been expecting to hear from. The email contains an attachment that you weren't expecting, and the email message is vague. The appropriate course of action is to do which of the following?
Answer explanation:
Unexpected or vague email attachments are potential security risks, even if they seem to come from known contacts. The best course of action is to seek clarity from the client (using the email that you have on file, if different than the sender email with the attachment) before opening the attachment.
If you cannot verify the sender's intent, do not open the attachment, and report the incident to your IT or security department.
Proactive steps to help prevent social engineering attacks include which of the following?
Answer explanation:
Regular software and operating system updates, as well as vigilant verification of unsolicited communications, are critical steps in preventing social engineering attacks.
Sharing passwords, even with trusted colleagues, and clicking links to validate sources are practices that can put you and your company’s security at risk.
It is important to use different passwords for different accounts for which of the following reasons?
Answer explanation:
Using different passwords for different accounts is a critical security practice because it helps limit damage in case one of your accounts is compromised. If you use the same password for all accounts, a breach of one could lead to a breach of all.
You receive an unexpected email that appears to be from your manager. The email requests your login credentials to access a report they urgently need. The email has a tone of urgency, and the sender's email address appears slightly different from your manager's usual email address.
The best course of action is to do which of the following?
Answer explanation:
The situation described is a common setup for a phishing attempt, a type of social engineering attack. Here, the attacker is impersonating a trusted figure (your manager) to manipulate you into revealing sensitive information (your login credentials). Key red flags include the unexpected nature of the request, the sense of urgency, and the irregularity in the sender's email address.
The correct course of action in such situations is to independently verify the request using a known, trusted contact method - in this case, by calling your manager directly. This will allow you to confirm the legitimacy of the request and prevent potential breaches. Always remember, it's better to verify first before acting on suspicious or unexpected requests.
Which of the following are appropriate actions to take if you believe your computer has been compromised in a social engineering attempt?
Answer explanation:
If you suspect your computer has been compromised due to a social engineering attempt, the most appropriate first steps are to alert your supervisor and the IT security department and to disconnect your computer system from the network.
Alerting the proper channels in your organization is vital for two main reasons:
1. ensure that trained professionals can initiate incident response procedures, and
2. heighten the organization's awareness and potentially prevent others from falling for the same attack.
Disconnecting your system from the network is an important step to contain the potential threat. By doing this, you prevent any potential malware from spreading across the network or any sensitive data from being transmitted back to the attacker.
You receive an email from an unknown sender claiming they've been contracted by your company to conduct a system upgrade. The email contains detailed technical jargon and states that your input is critical to the upgrade process. The sender asks for your login credentials to conduct a 'system compatibility check.' There is an air of urgency, but the sender does mention that if you have concerns, you can reach out to a person who is, in fact, your company's IT head, but on a non-business phone number.
Your immediate course of action is to do which of the following?
Answer explanation:
This scenario represents a sophisticated social engineering attempt. It's characterized by complex technical language and contextually relevant details, which may cause recipients to overlook the usual warning signs. The request for login credentials, the pressure of urgency, and the unusual communication channel (non-business phone number) for verification are all red flags.
In such cases, the immediate course of action should be to report the incident to your immediate supervisor and your organization's official IT security department. You should refrain from further engagement with the sender or any unofficial communication channels mentioned in the suspicious email. The appropriate department will handle the situation and take the necessary steps to investigate and mitigate any potential threats.
You receive a call from a person who identifies themselves as a member of your organization's IT department. The caller tells you they have been monitoring unusual activity on your network and believes your computer has been compromised. They ask you to install a particular 'security' software to help them track the 'intruder.'
While the caller does not request any personal information directly, they insist on immediate action to prevent significant data loss. The caller suggests that if you are uncomfortable installing the software, you can contact your direct supervisor on a mobile number, which you notice is different from the one you have on record. The caller also tells you that your supervisor who has been informed of the situation.
Your immediate course of action should be to do which of the following?
Answer explanation:
The scenario presents a highly sophisticated social engineering attempt that uses the perceived authority of the IT department and the urgency of a security breach to manipulate you into taking action that could potentially compromise the security of your computer and network.
Your immediate response should be to disconnect the call without taking any proposed action. It's important not to follow instructions or act on information given by an unverified source, especially when they involve installing software or contacting someone via an unofficial channel. Instead, report the incident to your immediate supervisor and your organization's official IT security department using verified contact details. They can assess the situation and take the appropriate steps to safeguard against potential threats.
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Privacy Policy
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.