Experience the efficiency of AI in microlearning content creation. Join our webinar to see how you can create & deliver training faster than ever! Register >

< Library Home

Identifying and Combating Social Engineering Attacks

Content by Qstream

In the increasingly connected digital world, every office worker is a potential target for social engineering attacks. This interactive, scenario-based learning experience empowers you with the knowledge and skills to recognize and respond to a variety of social engineering tactics effectively. You’ll delve into the psychology behind these attacks, learn to spot red flags in communications and practice proactive measures to enhance your digital security.

Launch To My Team

Category: Safety and Risk Management Workplace Tools & Skills

Industry: All Industries

Questions: 15

FREE

Content Preview

Identifying and Combating Social Engineering Attacks

With this Qstream module, you’ll understand the crucial role of incident reporting in safeguarding your organization’s information assets. Step into this immersive learning journey and become the human firewall your organization needs. Remember, in the battle against cyber threats, you are the first line of defense!

Click on each title to preview the question in the mobile/desktop widget.

1. What is Social Engineering? >
2. Common Forms of Social Engineering Attacks >
3. Intricate Social Engineering Schemes >
4. ID Phishing Attacks >
5. Pretexting in Communication >
6. Understanding Baiting Tactics >
7. Suspicious Requests in Communications >
8. Suspicious Email Content >
9. Malicious Email Attachments >
10. Prevent Social Engineering Attacks >
11. Secure Password Practices >
12. Reacting to a Suspicious Email  >
13. Actions to Take After an Attempt >
14. Taking Action on a Complex Attempt >
15. Handling an Unexpected Call >

Follow the interactions on each screen to answer Qstream questions as a Participant.

Which of the following best describes social engineering in the context of information security?

Answer explanation:
Social engineering in information security refers to deceptive tactics that manipulate individuals into revealing confidential information. These tactics often exploit human psychology and can take various forms, from impersonating trustworthy figures to creating scenarios of urgency.

Which of the following are common forms of social engineering attacks?

Answer explanation:
Social engineering attacks focus on exploiting human behavior and trust, such as in phishing and pretexting. Phishing typically involves deceptive emails that mimic legitimate organizations to trick individuals into revealing sensitive data. Pretexting uses fabricated scenarios to persuade victims to divulge information.

On the contrary, malware and ransomware are types of malicious software that compromise computer systems. While they can be disseminated through social engineering tactics, they are not social engineering methods themselves.

Meanwhile, encryption and hashing are cryptographic techniques used to safeguard data, not to manipulate individuals into disclosing information.

Lastly, firewalls and intrusion detection systems are protective measures used to ward off unauthorized access and detect potential threats. These are components of a cybersecurity framework, not social engineering techniques.

By understanding the essence of social engineering attacks—manipulating human behaviors and trust—we can better recognize and resist them.

Imagine you receive a phone call from someone claiming to be a pollster from a reputable research firm. The caller informs you they're conducting a survey on customer satisfaction in the banking sector. They inquire about your experiences, favorite banking services, and subtly shift the conversation to more personal questions about your accounts. Over the course of the conversation, they build rapport, making you feel comfortable. As the call progresses, they casually slip in a question about your account details, promising the information would be used strictly for research purposes.

This social engineering attack can be described as which of the following?

Answer explanation:
The situation described is a classic example of pretexting, a form of social engineering. Unlike phishing, which typically involves impersonating an entity to trick you into revealing sensitive data, pretexting is a step further: it involves establishing trust and rapport with the target before subtly shifting the conversation to extract valuable information.

In this scenario, the person posing as a pollster tries to build trust, using a seemingly innocent conversation about banking experiences as a pretext to solicit sensitive information.

If you encounter such a situation, it's crucial to remember never to disclose personal or financial information to unverified sources. Even seemingly harmless information can be valuable in social engineering attacks. If you suspect such an attempt, immediately end the conversation, and report the incident to your bank's security department through their official and trusted channels. This approach is essential in protecting your personal and financial information from potential threats.

You receive an email from your company's IT department stating that they need to perform an emergency update on your system and need your login credentials to proceed. You didn't receive any prior communication about this update.

This type of social engineering attack is most likely which of the following?

Answer explanation:
This situation is most indicative of a phishing attack, a form of social engineering where an attacker pretends to be a reputable entity in order to gather sensitive information. Phishing attacks often exploit the element of trust and use it to deceive individuals into revealing confidential data like login credentials.

In this case, the sender is impersonating your IT department and creating a sense of urgency by saying they need to perform an 'emergency update'. But it's crucial to remember that legitimate organizations, especially IT departments, rarely, if ever, ask for sensitive information like passwords through email.

If you encounter such a situation, the best course of action is to not reply to the email or click any included links. Instead, contact your IT department directly using known and trusted contact methods to verify the legitimacy of the request. This incident should also be reported so the potential security threat can be addressed.

By being cautious about unsolicited requests for sensitive information and always double-checking, you can help protect both yourself and your organization from phishing attempts.

A caller claiming to be from the company's HR department asks for your personal details to 'update their records'. They even discuss some recent company events to establish credibility. However, you feel suspicious, as the HR department usually sends such requests via email.

Which of the following types of social engineering is likely being attempted here?

Answer explanation:
The situation described is a classic example of pretexting. In pretexting, the attacker creates a plausible excuse, or pretext, to ask for the information they want. They often pretend to need the information for legitimate reasons, such as the 'record updating' mentioned in the scenario.

It's crucial not to give out personal details over the phone unless you can verify the caller's identity. If you find yourself in a similar situation, take the caller's name, hang up, and call back the official number for your HR department to verify the call's authenticity. This way, you ensure you are not divulging critical information to potential attackers. Remember, being vigilant and taking a moment to verify can save you from potential security risks.

Which of the following best describes the social engineering tactic known as 'baiting'?

Answer explanation:
'Baiting' is a specific form of social engineering that exploits human curiosity and greed. It involves offering a false promise of free goods or benefits to encourage individuals to share personal or confidential information. It often appears as an irresistible offer that's too good to be true, such as free downloads of movies, music, or software.

This tactic differs from the other options listed.
• “Creating a false scenario to convince someone to divulge information” refers to 'pretexting,' where an attacker creates a convincing false scenario to elicit information.
• “Using flattery or authority to manipulate someone into revealing confidential data” describes 'influence tactics,' using flattery or authority to manipulate someone into revealing data.
• “Impersonating a trusted individual or entity to request confidential information” corresponds to 'phishing,' where the attacker impersonates a trusted entity to trick the victim into sharing confidential information.

Remember, if something seems too good to be true, it probably is. Always verify any suspicious offers and never provide personal or sensitive information without complete assurance of the requester's authenticity.

An external supplier, with whom your company regularly works, sends an email urgently requesting payment to a new bank account due to "accounting changes." The email is worded professionally, but it unexpectedly came without prior notice or official letterhead.

You should do which of the following?

Answer explanation:
This situation has potential signs of a social engineering attempt known as invoice fraud. Despite the urgency and familiarity with the supplier, the absence of official letterhead and abrupt change of bank account details are suspicious.

The appropriate action would be to verify the information independently before proceeding. You should contact the supplier directly using previously known and verified contact information, not the contact information provided in the suspicious email, to confirm if the bank details have genuinely changed. This approach can prevent potential financial loss and data breach.

Which of the following attributes could indicate a potentially malicious email?

Answer explanation:
Malicious emails often include several common indicators or "red flags." These might include being sent outside of regular business hours, suggesting that the sender may be operating in a different time zone. Spelling and grammatical errors can be common, as attackers may not pay careful attention to language usage, or they may not be native speakers of the email's language. Generic greetings are often used in phishing attempts, as the same email is sent en masse to many recipients.

If learners receive an email that they suspect is malicious or a phishing attempt, they should follow these steps:

1. Do not interact with the email: This means not clicking any links, downloading any attachments, or responding to the email in any way.
2. Verify the sender: If the email claims to be from a known entity like your bank or workplace, contact that organization directly using a trusted method (like the contact information listed on their official website), not the contact information provided in the suspicious email.
3. Report the email: Notify your IT or security department about the suspicious email. They can help confirm whether it's a threat and take appropriate measures. If the email pretends to be from an external organization like a bank, report the email to them as well.


Although it's possible for a colleague's email to be compromised, emails from trusted colleagues are typically safe. The use of very formal language and correct grammar does not necessarily indicate a malicious email, since professional communication often includes these elements. Therefore, while it's important to be vigilant, these attributes alone should not cause alarm.

You receive an email from a client you've been expecting to hear from. The email contains an attachment that you weren't expecting, and the email message is vague. The appropriate course of action is to do which of the following?

Answer explanation:
Unexpected or vague email attachments are potential security risks, even if they seem to come from known contacts. The best course of action is to seek clarity from the client (using the email that you have on file, if different than the sender email with the attachment) before opening the attachment.

If you cannot verify the sender's intent, do not open the attachment, and report the incident to your IT or security department.

Proactive steps to help prevent social engineering attacks include which of the following?

Answer explanation:
Regular software and operating system updates, as well as vigilant verification of unsolicited communications, are critical steps in preventing social engineering attacks.

Sharing passwords, even with trusted colleagues, and clicking links to validate sources are practices that can put you and your company’s security at risk.

It is important to use different passwords for different accounts for which of the following reasons?

Answer explanation:
Using different passwords for different accounts is a critical security practice because it helps limit damage in case one of your accounts is compromised. If you use the same password for all accounts, a breach of one could lead to a breach of all.

You receive an unexpected email that appears to be from your manager. The email requests your login credentials to access a report they urgently need. The email has a tone of urgency, and the sender's email address appears slightly different from your manager's usual email address.

The best course of action is to do which of the following?

Answer explanation:
The situation described is a common setup for a phishing attempt, a type of social engineering attack. Here, the attacker is impersonating a trusted figure (your manager) to manipulate you into revealing sensitive information (your login credentials). Key red flags include the unexpected nature of the request, the sense of urgency, and the irregularity in the sender's email address.

The correct course of action in such situations is to independently verify the request using a known, trusted contact method - in this case, by calling your manager directly. This will allow you to confirm the legitimacy of the request and prevent potential breaches. Always remember, it's better to verify first before acting on suspicious or unexpected requests.

Which of the following are appropriate actions to take if you believe your computer has been compromised in a social engineering attempt?

Answer explanation:
If you suspect your computer has been compromised due to a social engineering attempt, the most appropriate first steps are to alert your supervisor and the IT security department and to disconnect your computer system from the network.

Alerting the proper channels in your organization is vital for two main reasons:
1. ensure that trained professionals can initiate incident response procedures, and
2. heighten the organization's awareness and potentially prevent others from falling for the same attack.

Disconnecting your system from the network is an important step to contain the potential threat. By doing this, you prevent any potential malware from spreading across the network or any sensitive data from being transmitted back to the attacker.

You receive an email from an unknown sender claiming they've been contracted by your company to conduct a system upgrade. The email contains detailed technical jargon and states that your input is critical to the upgrade process. The sender asks for your login credentials to conduct a 'system compatibility check.' There is an air of urgency, but the sender does mention that if you have concerns, you can reach out to a person who is, in fact, your company's IT head, but on a non-business phone number.

Your immediate course of action is to do which of the following?

Answer explanation:
This scenario represents a sophisticated social engineering attempt. It's characterized by complex technical language and contextually relevant details, which may cause recipients to overlook the usual warning signs. The request for login credentials, the pressure of urgency, and the unusual communication channel (non-business phone number) for verification are all red flags.

In such cases, the immediate course of action should be to report the incident to your immediate supervisor and your organization's official IT security department. You should refrain from further engagement with the sender or any unofficial communication channels mentioned in the suspicious email. The appropriate department will handle the situation and take the necessary steps to investigate and mitigate any potential threats.

You receive a call from a person who identifies themselves as a member of your organization's IT department. The caller tells you they have been monitoring unusual activity on your network and believes your computer has been compromised. They ask you to install a particular 'security' software to help them track the 'intruder.'

While the caller does not request any personal information directly, they insist on immediate action to prevent significant data loss. The caller suggests that if you are uncomfortable installing the software, you can contact your direct supervisor on a mobile number, which you notice is different from the one you have on record. The caller also tells you that your supervisor who has been informed of the situation.

Your immediate course of action should be to do which of the following?

Answer explanation:
The scenario presents a highly sophisticated social engineering attempt that uses the perceived authority of the IT department and the urgency of a security breach to manipulate you into taking action that could potentially compromise the security of your computer and network.

Your immediate response should be to disconnect the call without taking any proposed action. It's important not to follow instructions or act on information given by an unverified source, especially when they involve installing software or contacting someone via an unofficial channel. Instead, report the incident to your immediate supervisor and your organization's official IT security department using verified contact details. They can assess the situation and take the appropriate steps to safeguard against potential threats.

Which of the following best describes social engineering in the context of information security?

Answer explanation:
Social engineering in information security refers to deceptive tactics that manipulate individuals into revealing confidential information. These tactics often exploit human psychology and can take various forms, from impersonating trustworthy figures to creating scenarios of urgency.

Which of the following are common forms of social engineering attacks?

Answer explanation:
Social engineering attacks focus on exploiting human behavior and trust, such as in phishing and pretexting. Phishing typically involves deceptive emails that mimic legitimate organizations to trick individuals into revealing sensitive data. Pretexting uses fabricated scenarios to persuade victims to divulge information.

On the contrary, malware and ransomware are types of malicious software that compromise computer systems. While they can be disseminated through social engineering tactics, they are not social engineering methods themselves.

Meanwhile, encryption and hashing are cryptographic techniques used to safeguard data, not to manipulate individuals into disclosing information.

Lastly, firewalls and intrusion detection systems are protective measures used to ward off unauthorized access and detect potential threats. These are components of a cybersecurity framework, not social engineering techniques.

By understanding the essence of social engineering attacks—manipulating human behaviors and trust—we can better recognize and resist them.

Imagine you receive a phone call from someone claiming to be a pollster from a reputable research firm. The caller informs you they're conducting a survey on customer satisfaction in the banking sector. They inquire about your experiences, favorite banking services, and subtly shift the conversation to more personal questions about your accounts. Over the course of the conversation, they build rapport, making you feel comfortable. As the call progresses, they casually slip in a question about your account details, promising the information would be used strictly for research purposes.

This social engineering attack can be described as which of the following?

Answer explanation:
The situation described is a classic example of pretexting, a form of social engineering. Unlike phishing, which typically involves impersonating an entity to trick you into revealing sensitive data, pretexting is a step further: it involves establishing trust and rapport with the target before subtly shifting the conversation to extract valuable information.

In this scenario, the person posing as a pollster tries to build trust, using a seemingly innocent conversation about banking experiences as a pretext to solicit sensitive information.

If you encounter such a situation, it's crucial to remember never to disclose personal or financial information to unverified sources. Even seemingly harmless information can be valuable in social engineering attacks. If you suspect such an attempt, immediately end the conversation, and report the incident to your bank's security department through their official and trusted channels. This approach is essential in protecting your personal and financial information from potential threats.

You receive an email from your company's IT department stating that they need to perform an emergency update on your system and need your login credentials to proceed. You didn't receive any prior communication about this update.

This type of social engineering attack is most likely which of the following?

Answer explanation:
This situation is most indicative of a phishing attack, a form of social engineering where an attacker pretends to be a reputable entity in order to gather sensitive information. Phishing attacks often exploit the element of trust and use it to deceive individuals into revealing confidential data like login credentials.

In this case, the sender is impersonating your IT department and creating a sense of urgency by saying they need to perform an 'emergency update'. But it's crucial to remember that legitimate organizations, especially IT departments, rarely, if ever, ask for sensitive information like passwords through email.

If you encounter such a situation, the best course of action is to not reply to the email or click any included links. Instead, contact your IT department directly using known and trusted contact methods to verify the legitimacy of the request. This incident should also be reported so the potential security threat can be addressed.

By being cautious about unsolicited requests for sensitive information and always double-checking, you can help protect both yourself and your organization from phishing attempts.

A caller claiming to be from the company's HR department asks for your personal details to 'update their records'. They even discuss some recent company events to establish credibility. However, you feel suspicious, as the HR department usually sends such requests via email.

Which of the following types of social engineering is likely being attempted here?

Answer explanation:
The situation described is a classic example of pretexting. In pretexting, the attacker creates a plausible excuse, or pretext, to ask for the information they want. They often pretend to need the information for legitimate reasons, such as the 'record updating' mentioned in the scenario.

It's crucial not to give out personal details over the phone unless you can verify the caller's identity. If you find yourself in a similar situation, take the caller's name, hang up, and call back the official number for your HR department to verify the call's authenticity. This way, you ensure you are not divulging critical information to potential attackers. Remember, being vigilant and taking a moment to verify can save you from potential security risks.

Which of the following best describes the social engineering tactic known as 'baiting'?

Answer explanation:
'Baiting' is a specific form of social engineering that exploits human curiosity and greed. It involves offering a false promise of free goods or benefits to encourage individuals to share personal or confidential information. It often appears as an irresistible offer that's too good to be true, such as free downloads of movies, music, or software.

This tactic differs from the other options listed.
• “Creating a false scenario to convince someone to divulge information” refers to 'pretexting,' where an attacker creates a convincing false scenario to elicit information.
• “Using flattery or authority to manipulate someone into revealing confidential data” describes 'influence tactics,' using flattery or authority to manipulate someone into revealing data.
• “Impersonating a trusted individual or entity to request confidential information” corresponds to 'phishing,' where the attacker impersonates a trusted entity to trick the victim into sharing confidential information.

Remember, if something seems too good to be true, it probably is. Always verify any suspicious offers and never provide personal or sensitive information without complete assurance of the requester's authenticity.

An external supplier, with whom your company regularly works, sends an email urgently requesting payment to a new bank account due to "accounting changes." The email is worded professionally, but it unexpectedly came without prior notice or official letterhead.

You should do which of the following?

Answer explanation:
This situation has potential signs of a social engineering attempt known as invoice fraud. Despite the urgency and familiarity with the supplier, the absence of official letterhead and abrupt change of bank account details are suspicious.

The appropriate action would be to verify the information independently before proceeding. You should contact the supplier directly using previously known and verified contact information, not the contact information provided in the suspicious email, to confirm if the bank details have genuinely changed. This approach can prevent potential financial loss and data breach.

Which of the following attributes could indicate a potentially malicious email?

Answer explanation:
Malicious emails often include several common indicators or "red flags." These might include being sent outside of regular business hours, suggesting that the sender may be operating in a different time zone. Spelling and grammatical errors can be common, as attackers may not pay careful attention to language usage, or they may not be native speakers of the email's language. Generic greetings are often used in phishing attempts, as the same email is sent en masse to many recipients.

If learners receive an email that they suspect is malicious or a phishing attempt, they should follow these steps:

1. Do not interact with the email: This means not clicking any links, downloading any attachments, or responding to the email in any way.
2. Verify the sender: If the email claims to be from a known entity like your bank or workplace, contact that organization directly using a trusted method (like the contact information listed on their official website), not the contact information provided in the suspicious email.
3. Report the email: Notify your IT or security department about the suspicious email. They can help confirm whether it's a threat and take appropriate measures. If the email pretends to be from an external organization like a bank, report the email to them as well.


Although it's possible for a colleague's email to be compromised, emails from trusted colleagues are typically safe. The use of very formal language and correct grammar does not necessarily indicate a malicious email, since professional communication often includes these elements. Therefore, while it's important to be vigilant, these attributes alone should not cause alarm.

You receive an email from a client you've been expecting to hear from. The email contains an attachment that you weren't expecting, and the email message is vague. The appropriate course of action is to do which of the following?

Answer explanation:
Unexpected or vague email attachments are potential security risks, even if they seem to come from known contacts. The best course of action is to seek clarity from the client (using the email that you have on file, if different than the sender email with the attachment) before opening the attachment.

If you cannot verify the sender's intent, do not open the attachment, and report the incident to your IT or security department.

Proactive steps to help prevent social engineering attacks include which of the following?

Answer explanation:
Regular software and operating system updates, as well as vigilant verification of unsolicited communications, are critical steps in preventing social engineering attacks.

Sharing passwords, even with trusted colleagues, and clicking links to validate sources are practices that can put you and your company’s security at risk.

It is important to use different passwords for different accounts for which of the following reasons?

Answer explanation:
Using different passwords for different accounts is a critical security practice because it helps limit damage in case one of your accounts is compromised. If you use the same password for all accounts, a breach of one could lead to a breach of all.

You receive an unexpected email that appears to be from your manager. The email requests your login credentials to access a report they urgently need. The email has a tone of urgency, and the sender's email address appears slightly different from your manager's usual email address.

The best course of action is to do which of the following?

Answer explanation:
The situation described is a common setup for a phishing attempt, a type of social engineering attack. Here, the attacker is impersonating a trusted figure (your manager) to manipulate you into revealing sensitive information (your login credentials). Key red flags include the unexpected nature of the request, the sense of urgency, and the irregularity in the sender's email address.

The correct course of action in such situations is to independently verify the request using a known, trusted contact method - in this case, by calling your manager directly. This will allow you to confirm the legitimacy of the request and prevent potential breaches. Always remember, it's better to verify first before acting on suspicious or unexpected requests.

Which of the following are appropriate actions to take if you believe your computer has been compromised in a social engineering attempt?

Answer explanation:
If you suspect your computer has been compromised due to a social engineering attempt, the most appropriate first steps are to alert your supervisor and the IT security department and to disconnect your computer system from the network.

Alerting the proper channels in your organization is vital for two main reasons:
1. ensure that trained professionals can initiate incident response procedures, and
2. heighten the organization's awareness and potentially prevent others from falling for the same attack.

Disconnecting your system from the network is an important step to contain the potential threat. By doing this, you prevent any potential malware from spreading across the network or any sensitive data from being transmitted back to the attacker.

You receive an email from an unknown sender claiming they've been contracted by your company to conduct a system upgrade. The email contains detailed technical jargon and states that your input is critical to the upgrade process. The sender asks for your login credentials to conduct a 'system compatibility check.' There is an air of urgency, but the sender does mention that if you have concerns, you can reach out to a person who is, in fact, your company's IT head, but on a non-business phone number.

Your immediate course of action is to do which of the following?

Answer explanation:
This scenario represents a sophisticated social engineering attempt. It's characterized by complex technical language and contextually relevant details, which may cause recipients to overlook the usual warning signs. The request for login credentials, the pressure of urgency, and the unusual communication channel (non-business phone number) for verification are all red flags.

In such cases, the immediate course of action should be to report the incident to your immediate supervisor and your organization's official IT security department. You should refrain from further engagement with the sender or any unofficial communication channels mentioned in the suspicious email. The appropriate department will handle the situation and take the necessary steps to investigate and mitigate any potential threats.

You receive a call from a person who identifies themselves as a member of your organization's IT department. The caller tells you they have been monitoring unusual activity on your network and believes your computer has been compromised. They ask you to install a particular 'security' software to help them track the 'intruder.'

While the caller does not request any personal information directly, they insist on immediate action to prevent significant data loss. The caller suggests that if you are uncomfortable installing the software, you can contact your direct supervisor on a mobile number, which you notice is different from the one you have on record. The caller also tells you that your supervisor who has been informed of the situation.

Your immediate course of action should be to do which of the following?

Answer explanation:
The scenario presents a highly sophisticated social engineering attempt that uses the perceived authority of the IT department and the urgency of a security breach to manipulate you into taking action that could potentially compromise the security of your computer and network.

Your immediate response should be to disconnect the call without taking any proposed action. It's important not to follow instructions or act on information given by an unverified source, especially when they involve installing software or contacting someone via an unofficial channel. Instead, report the incident to your immediate supervisor and your organization's official IT security department using verified contact details. They can assess the situation and take the appropriate steps to safeguard against potential threats.

Interested in this content and learning more?

Schedule a Call with Qstream

Looking for more questions?
We have the answers.