1.
A security consultant decides to use multiple layers of anti-virus defense, such as end-user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?
Correct Answer
C. Social engineering attack
Explanation
Using multiple layers of anti-virus defense, such as end-user desktop anti-virus and E-mail gateway, can help mitigate social engineering attacks. Social engineering attacks involve manipulating individuals to disclose sensitive information or perform certain actions. By having anti-virus protection at both the desktop level and the email gateway, it can help detect and block malicious emails or attachments that may be used in social engineering attacks. This multi-layered approach adds an extra layer of protection against these types of attacks.
2.
A person who uses hacking skills for defensive purposes is called a:
Correct Answer
D. White hat Hacker
Explanation
A person who uses hacking skills for defensive purposes is called a White hat Hacker. White hat hackers are ethical hackers who use their skills to identify vulnerabilities in computer systems and networks in order to help organizations improve their security. They work with the consent of the system owner and follow strict ethical guidelines to ensure that they do not cause any harm. Unlike black hat hackers who exploit vulnerabilities for personal gain, white hat hackers aim to protect and secure systems from potential threats.
3.
Which of the following refers to an attacker exploiting vulnerabilities before the vendor has a patch or mitigation for them?
Correct Answer
B. Â Zero-day attack
Explanation
A zero-day attack refers to an attacker exploiting vulnerabilities in a system before the vendor has developed a patch or mitigation for them. This means that the attacker takes advantage of the vulnerability on the same day it is discovered, leaving the vendor with no time to release a fix. This type of attack can be highly dangerous as it gives the victim no opportunity to protect themselves or their systems.
4.
What is the preparatory phase of hacking called?
Correct Answer
B. ReconnaissanceÂ
Explanation
Reconnaissance is the preparatory phase of hacking where the attacker gathers information about the target system or network. This involves passive techniques such as searching for publicly available information, analyzing social media profiles, or conducting online research to identify potential vulnerabilities. The purpose of reconnaissance is to gather as much information as possible to plan the attack and identify the most effective method to exploit the target.
5.
Which of the following is a weakness in a system, application, network, or process?
Correct Answer
C. Vulnerability
Explanation
A vulnerability refers to a weakness in a system, application, network, or process that can be exploited by a threat or attacker. It is a flaw or gap in security measures that can allow unauthorized access, data breaches, or other malicious activities. Identifying and addressing vulnerabilities is crucial in maintaining the security and integrity of a system or network.
6.
Which of the following refers to an unskilled hacker that uses pre-made scripts and tools to hack into systems?
Correct Answer
D. Script Kiddie
Explanation
A script kiddie refers to an unskilled hacker who relies on pre-made scripts and tools to carry out hacking activities. Unlike ethical hackers who use their skills for legitimate purposes, script kiddies lack the technical knowledge and expertise to develop their own hacking techniques. Instead, they rely on readily available tools and scripts to exploit vulnerabilities in systems. This term is often used to describe individuals who engage in hacking activities without fully understanding the consequences or the ethical implications of their actions.
7.
Gathering information about a target without direct contact is called:
Correct Answer
B. Passive FootPrinting
Explanation
Passive FootPrinting is the correct answer because it refers to the process of collecting information about a target without directly engaging or interacting with the target. This can involve gathering data from publicly available sources, such as websites, social media, or public records, to gain insights and knowledge about the target. It is a non-intrusive approach that focuses on observing and analyzing existing information rather than actively probing or interacting with the target system or network.
8.
Which of the following ports is used by the Domain Name Service?
Correct Answer
A. 53
Explanation
Port 53 is used by the Domain Name Service (DNS). DNS is responsible for translating human-readable domain names into IP addresses that computers can understand. When a user enters a domain name into their web browser, the DNS server uses port 53 to query a database and retrieve the corresponding IP address for that domain name. This allows the user's computer to establish a connection with the correct server and load the requested website. Port 67, on the other hand, is used by the Dynamic Host Configuration Protocol (DHCP) server for assigning IP addresses to devices on a network.
9.
Which type of password attack makes use of extensive wordlists to hash and run against a captured password hash?
Correct Answer
D. Dictionary
Explanation
Dictionary attack is a type of password attack that makes use of extensive wordlists to hash and run against a captured password hash. In this attack, the attacker uses a list of common words or commonly used passwords to guess the password. The attacker hashes each word in the list and compares it to the captured password hash to see if there is a match. This method is often successful because many users choose weak passwords that can be easily found in a dictionary or wordlist.
10.
Where are password hashes stored on a Windows system?
Correct Answer
B. SAM file
Explanation
On a Windows system, password hashes are stored in the SAM (Security Accounts Manager) file. This file is located in the C:\Windows\system32 directory. The SAM file contains encrypted user account passwords and is an essential component of the Windows operating system's security mechanisms. It is used to authenticate user logins and protect the passwords from unauthorized access.
11.
All of the following are considered clear text protocols EXCEPT:
Correct Answer
C. SSH
Explanation
Telnet, FTP, and HTTP are all examples of clear text protocols, meaning that the data transmitted over these protocols is not encrypted and can be easily intercepted and read by unauthorized individuals. However, SSH (Secure Shell) is not a clear text protocol. It is a secure network protocol that provides a secure channel over an unsecured network, encrypting the data transmitted between the client and the server, thus protecting it from eavesdropping and unauthorized access.
12.
Which of the following open source tools would be the best choice to scan a network for
potential targets?
Correct Answer
A. NMAP
Explanation
NMAP would be the best choice to scan a network for potential targets. NMAP is a widely used open source tool that allows for network exploration and security auditing. It provides a comprehensive range of scanning techniques to identify open ports, services, and vulnerabilities on a network. With its extensive functionality and flexibility, NMAP is considered one of the most reliable and effective tools for network scanning and reconnaissance.
13.
Which of the following is the successor of SSL?
Correct Answer
A. TLS
Explanation
The successor of SSL is TLS (Transport Layer Security). TLS is a cryptographic protocol that provides secure communication over a network. It is an updated version of SSL and offers improved security features and stronger encryption algorithms. TLS is widely used to secure online transactions, email communication, and other sensitive data transfers on the internet. RSA, GRE, and IPSec are not successors of SSL, but rather different protocols or encryption algorithms used in networking and security.
14.
As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?
Correct Answer
A. Terms of Engagement
Explanation
The Terms of Engagement document describes the specifics of the testing, including the scope of the project and any limitations or restrictions. It also outlines the responsibilities and expectations of both the organization and the tester, ensuring that both parties are protected and aware of their liabilities. This document serves as a legally binding agreement that protects the organization's interests and outlines the boundaries within which the tester can operate.
15.
The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?
Correct Answer
B. SYN
Explanation
The correct answer is SYN. In the TCP 3-way handshake, the client initiates the connection by sending a SYN (synchronize) message to the server. This message indicates the client's desire to establish a connection. The server then responds with a SYN-ACK (synchronize-acknowledge) message, indicating its willingness to establish the connection. Finally, the client sends an ACK (acknowledge) message to acknowledge the server's response and complete the handshake process. Therefore, the client sends the SYN message to begin the negotiation.
16.
A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible. They did not provide any
information besides the name of their company. What phase of security testing would your team jump in right away?
Correct Answer
B. Reconnaissance
Explanation
In this scenario, the team of Ethical Hackers would jump right into the Reconnaissance phase of security testing. This phase involves gathering information about the target company, such as its infrastructure, systems, and potential vulnerabilities. Since the company did not provide any information besides its name, the team would need to conduct initial research and intelligence gathering to understand the company's network systems and identify potential entry points for attacks. This phase helps the team to simulate a realistic attack by understanding the target's environment and preparing for further steps in the testing process.
17.
Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design and implementation?
Correct Answer
A. Penetration testing
Explanation
Penetration testing is the method that can provide a better return on IT security investment and a thorough assessment of organizational security. It involves simulating real-world attacks to identify vulnerabilities in the system, policies, and procedures. By actively exploiting these vulnerabilities, organizations can understand the potential impact and prioritize remediation efforts. This comprehensive approach helps to identify weaknesses in policy, procedure design, and implementation, ensuring a more robust security posture.
18.
Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?
Correct Answer
B. Nessus
Explanation
Nessus is the correct answer because it is a widely used network scanning tool that can perform vulnerability checks and compliance auditing. It scans networks to identify potential vulnerabilities in systems and provides detailed reports on the security posture of the network. Nessus can also check for compliance with various industry standards and regulations, making it a comprehensive tool for assessing network security.
19.
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
Correct Answer
B. Cross-Site Scripting (XSS)
Explanation
Cross-Site Scripting (XSS) is the correct answer because it refers to the web application attack where attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users. This allows the attackers to execute malicious scripts on the victim's browser, potentially stealing sensitive information or performing unauthorized actions on behalf of the user. SQL injection, LDAP injection, and Cross-Site Request Forgery (CSRF) are different types of web application attacks that do not specifically involve injecting client-side scripts into web pages.
20.
Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?
Correct Answer
B. -T5
Explanation
The -T5 option in Nmap is used for setting the timing template to the highest speed, allowing for a very fast scan. This option is suitable when the user is not concerned about being detected and wants to quickly scan the target. The higher the timing template, the faster the scan will be. Therefore, -T5 is the correct option for performing a very fast scan without worrying about being detected.
21.
Which is the first step followed by Vulnerability Scanners for scanning a network?
Correct Answer
D. Checking if the remote host is alive
Explanation
The first step followed by Vulnerability Scanners for scanning a network is checking if the remote host is alive. This step is crucial as it ensures that the host is active and reachable before proceeding with further scanning. By checking if the remote host is alive, the scanner can determine if the target system is online and responsive, allowing for a successful and accurate vulnerability assessment.
22.
The "gray box testing" methodology enforces what kind of restriction?
Correct Answer
A. The internal operation of a system is only partly accessible to the tester.
Explanation
Gray box testing is a methodology that combines elements of both black box testing (where the internal workings of a system are unknown to the tester) and white box testing (where the internal workings of a system are fully known to the tester). In gray box testing, the tester has partial knowledge of the internal operation of the system. This means that while the tester may have some understanding of the internal workings, there are still certain aspects that are inaccessible or unknown. Therefore, the correct answer is "The internal operation of a system is only partly accessible to the tester."
23.
Seth is starting a penetration test from inside the network. He hasn't been given any information about the network. What type of test is he conducting?
Correct Answer
C. Internal, Blackbox
Explanation
Seth is conducting an internal blackbox test. In this type of test, the tester has no prior knowledge about the internal network and is simulating an attack from within the network to identify vulnerabilities and weaknesses. The term "blackbox" refers to the lack of knowledge about the internal network, while "internal" indicates that the test is being performed from within the network rather than externally.
24.
Which of the following is a low-tech way of gaining unauthorized access to systems?
Correct Answer
A. Social Engineering
Explanation
Social Engineering is a low-tech way of gaining unauthorized access to systems by manipulating and deceiving individuals to obtain sensitive information or perform actions that compromise security. It involves exploiting human psychology and trust to trick people into revealing passwords, granting access, or providing confidential information. Unlike the other options listed, Social Engineering does not rely on technical methods like network scanning or sniffing data packets, but instead exploits human vulnerabilities to gain unauthorized access.
25.
In order to have an anonymous Internet surf, which of the following is best choice?
Correct Answer
B. Use Tor network with multi-node
Explanation
Using the Tor network with multi-node is the best choice for having an anonymous internet surf. Tor is a free and open-source network that helps in protecting the user's privacy by routing their internet traffic through a series of relays, making it difficult to trace the origin of the traffic. By using multiple nodes in the Tor network, the user's online activities become even more anonymous, as it becomes harder to track their internet traffic across different nodes. This ensures a higher level of privacy and anonymity while browsing the internet.
26.
Which of the following is an example of IP spoofing?
Correct Answer
B. Man-in-the-middle
Explanation
Man-in-the-middle is an example of IP spoofing. In this attack, an attacker intercepts communication between two parties and impersonates each party to the other, making them believe that they are communicating directly with each other. By doing so, the attacker can intercept and manipulate the data being exchanged, potentially gaining unauthorized access to sensitive information. This type of attack is often used to steal login credentials, financial information, or other valuable data.
27.
A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court. What is the ethical response?
Correct Answer
A. Say no; the friend is not the owner of the account.
Explanation
The ethical response is to say no because the friend is not the owner of the account. As a certified ethical hacker, it is important to adhere to ethical guidelines and laws. Breaking into someone's email account without their permission is a violation of privacy and potentially illegal. The CEH should advise the friend to seek legal means to address her concerns and should not engage in any activities that compromise the privacy and security of others.
28.
In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account's confidential files and information. How can he achieve this?
Correct Answer
C. Privilege Escalation
Explanation
Privilege escalation refers to the act of gaining higher levels of access or privileges within a system or network. In this scenario, the white hat hacker, who already has control over a user account, can exploit vulnerabilities or weaknesses in the system to elevate their privileges and gain access to another account's confidential files and information. This can be achieved through various techniques such as exploiting software vulnerabilities, misconfigurations, or leveraging administrative privileges. By escalating their privileges, the hacker can bypass security measures and gain unauthorized access to sensitive data.
29.
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?
Correct Answer
B. [site:]
Explanation
The [site:] operator in Google advanced search allows an attacker to restrict the search results to websites within a specific domain. By using this operator, an attacker can focus their search on a particular domain, making it easier to find vulnerabilities or sensitive information within that specific website. This operator is commonly used by attackers to target a specific organization or website during reconnaissance or information gathering phases of an attack.
30.
Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?
Correct Answer
D. Footprinting
Explanation
Footprinting is the most important phase of ethical hacking wherein you need to spend a considerable amount of time. Footprinting involves gathering information about the target system or network, such as IP addresses, domain names, employee details, system architecture, and vulnerabilities. This phase helps in understanding the target's infrastructure and identifying potential entry points. It lays the foundation for the subsequent phases of ethical hacking, including network mapping, gaining access, and escalating privileges. By thoroughly footprinting the target, ethical hackers can gather crucial information to plan and execute their attacks effectively.
31.
Which of the following is considered as one of the most reliable forms of TCP scanning?
Correct Answer
A. TCP Connect/Full Open Scan
Explanation
TCP Connect/Full Open Scan is considered as one of the most reliable forms of TCP scanning because it establishes a full TCP connection with the target host. This means that the scanning device completes the TCP handshake process, including the SYN, SYN-ACK, and ACK packets. By successfully establishing a connection, it confirms the availability of the port and the service running on it. This method is less likely to be detected by intrusion detection systems (IDS) compared to other scanning techniques like Half-open Scan, NULL Scan, and Xmas Scan.
32.
Nation-state threat actors often discover vulnerabilities and hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of vulnerability. What is this style of attack called?
Correct Answer
A. Zero-day
Explanation
A zero-day attack refers to a type of cyber attack where threat actors exploit vulnerabilities that are unknown to the software vendor or have not yet been patched. In the case of the Stuxnet attack, it was considered unprecedented because it utilized four different types of previously unknown vulnerabilities, making it a zero-day attack. This term is commonly used in the cybersecurity field to describe attacks that take advantage of undisclosed vulnerabilities.
33.
Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?
Correct Answer
A. Maltego
Explanation
Maltego is a tool that allows analysts and pen testers to examine links between data using graphs and link analysis. It provides a visual representation of relationships and connections within the data, making it easier to identify patterns, trends, and potential vulnerabilities. Cain & Abel, Metasploit, and Wireshark are all useful tools in their own right, but they do not specifically offer the same graph and link analysis capabilities as Maltego.
34.
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
Correct Answer
B. Install a CCTV with cameras pointing to the entrance doors and the street.
Explanation
Installing a CCTV with cameras pointing to the entrance doors and the street is the best option to monitor the physical perimeter and entrance doors 24 hours. This option allows for continuous surveillance and provides visual evidence in case of any security incidents. It covers both the entrance doors and the surrounding area, ensuring comprehensive monitoring of the new neighborhood, which is considered risky. The CCTV system will help deter potential criminals and provide a sense of security for the enterprise and its employees.
35.
The company ABC recently discovered that their new product was released by the opposition before their premiere. They contract an investigator who discovered that the maid threw away papers with confidential information about the new product and the opposition found it in the garbage. What is the name of the technique used by the opposition?
Correct Answer
C. Dumpster diving
Explanation
The technique used by the opposition in this scenario is called "dumpster diving." This involves searching through someone's trash or garbage to find valuable or confidential information. In this case, the maid unknowingly discarded papers with confidential information about the new product, which the opposition found and used to their advantage.
36.
What would you enter, if you wanted to perform a stealth scan using Nmap?
Correct Answer
B. Nmap -sS
Explanation
The correct answer is "nmap -sS". This is because the "-sS" flag in Nmap stands for "TCP SYN scan", which is a type of stealth scan. In a TCP SYN scan, Nmap sends SYN packets to the target host and analyzes the response to determine open ports. This scan is considered stealthy because it does not complete the full TCP handshake, making it harder for the target host to detect the scan.
37.
Which of the following parameters enables NMAP's operating system detection feature?
Correct Answer
D. NMAP -O
Explanation
The correct answer is "NMAP -O." The "-O" parameter in NMAP enables the operating system detection feature. This feature allows NMAP to identify the operating system running on the target host by analyzing various network packets and responses. By using this parameter, NMAP sends specific probes and analyzes the responses to determine the operating system type. This can be useful for network administrators to identify potential vulnerabilities and ensure the security of their systems.
38.
If there is an Intrusion Detection System (IDS) in intranet, which port scanning technique cannot be used?
Correct Answer
C. TCP SYN
Explanation
TCP SYN scanning cannot be used if there is an Intrusion Detection System (IDS) in the intranet. This scanning technique involves sending a SYN packet to the target host and waiting for a response. If the IDS is in place, it can detect this SYN packet and potentially block or alert the network administrator, making it ineffective for the attacker. Therefore, TCP SYN scanning is not a viable option when an IDS is present.
39.
When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation. What command will help you to search files using Google as a search engine?
Correct Answer
A. Site: target.com filetype:xls username password email
Explanation
The correct answer is "site: target.com filetype:xls username password email". This command allows you to search for files with the extension ".xls" on the website "target.com" that may contain sensitive information such as usernames, passwords, and emails. By using the "site:" operator, you restrict the search to a specific site, and the "filetype:" operator specifies the file extension to search for.
40.
Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?
Correct Answer
D. Msfvenom
Explanation
Msfvenom is a Metasploit Framework tool that can help penetration testers evade Anti-virus Systems. It allows for the generation of custom payloads that can bypass antivirus detection by encoding the payload and creating new variations of it. This tool provides options for payload encoding, obfuscation, and encryption, making it an effective tool for evading antivirus systems during penetration testing.
41.
Risks = Threats x Vulnerabilities is referred to as the:
Correct Answer
A. Risk equation
Explanation
The equation Risks = Threats x Vulnerabilities is commonly known as the risk equation. This equation represents the relationship between threats and vulnerabilities in determining the level of risk. By multiplying the threats and vulnerabilities together, organizations can assess and quantify the potential risks they face. This equation is widely used in risk management and helps organizations identify and prioritize their efforts to mitigate potential risks.
42.
Within the context of Computer Security, which of the following statements describes Social Engineering best?
Correct Answer
C. Social Engineering is the act of getting needed information from a person rather than breaking into a system
Explanation
Social Engineering is the act of manipulating or deceiving individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human psychology and trust to trick people into revealing confidential data or performing actions that could compromise security. This method is often used by attackers as it can be easier and more effective than attempting to bypass technical security measures.
43.
Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, which OS did it not directly affect?
Correct Answer
A. Windows
Explanation
Shellshock is a vulnerability in the Bash shell, which is commonly used in Unix-based operating systems like Linux and OS X. It allows unauthorized users to execute arbitrary commands, potentially gaining access to a server. However, Windows does not use the Bash shell as its default command-line interface, so it was not directly affected by the Shellshock vulnerability.
44.
Which is the best type of defense for social engineering attacks?
Correct Answer
D. Education
Explanation
Education is the best type of defense for social engineering attacks because it helps individuals recognize and understand the tactics used by attackers. By being educated on the various social engineering techniques, such as phishing or pretexting, individuals can learn to identify suspicious emails, phone calls, or requests for personal information. They can also learn how to respond appropriately and report any potential attacks. While strong passwords, permissions, and encryption can provide some level of protection, education is crucial in preventing social engineering attacks as it empowers individuals to make informed decisions and avoid falling victim to manipulation.
45.
An attack that allows database commands to be appended to invalid form input is known as:
Correct Answer
C. SQL injection
Explanation
SQL injection is an attack that allows an attacker to insert malicious SQL commands into a database query through invalid form input. By exploiting vulnerabilities in the application's code, the attacker can manipulate the SQL statements and gain unauthorized access to the database or perform unauthorized actions. This type of attack can lead to data theft, data manipulation, or even complete compromise of the affected system.
46.
Which type of test actually exploits weaknesses found in a system?
Correct Answer
D. Penetration test
Explanation
A penetration test is a type of test that identifies and exploits weaknesses in a system. This test simulates real-world attacks to assess the security of a system by attempting to bypass its defenses. It involves actively probing the system to find vulnerabilities and then exploiting them to gain unauthorized access or control. This test is often performed by ethical hackers to identify potential security risks and help organizations strengthen their defenses.
47.
Which type of computer-based social- engineering attack attempts to persuade users to click on links in an email?
Correct Answer
B. pHishing
Explanation
Phishing is a type of computer-based social engineering attack that aims to deceive and manipulate users into clicking on links in emails. The attackers typically impersonate a trustworthy entity, such as a bank or a popular website, and send out emails that appear legitimate. These emails often contain urgent or enticing messages, tricking users into revealing sensitive information or downloading malicious software. By pretending to be a trustworthy source, the attackers aim to gain unauthorized access to personal data, financial information, or login credentials.
48.
Which of the following social engineering techniques is used to get an individual’s password as it is entered on the keyboard?
Correct Answer
C. Shoulder Surfing
Explanation
Shoulder surfing is a social engineering technique where an individual observes another person's actions, specifically their keyboard inputs, in order to obtain their password. This can be done by physically looking over someone's shoulder while they enter their password or by using surveillance technology to monitor their keystrokes from a distance. By obtaining someone's password through shoulder surfing, an attacker can gain unauthorized access to their accounts and potentially exploit sensitive information.
49.
All of the following are susceptible to sniffing EXCEPT:
Correct Answer
C. Encrypted communications sessions
Explanation
Encrypted communications sessions are not susceptible to sniffing because the data being transmitted is encrypted, making it difficult for an attacker to intercept and understand the information. Sniffing refers to the act of capturing and analyzing network traffic, usually done by attackers to gain unauthorized access to sensitive data. However, with encrypted communications sessions, the data is protected and cannot be easily deciphered, ensuring the security and privacy of the transmitted information.
50.
All of the following human traits contribute to the success of social engineering attacks EXCEPT:
Correct Answer
A. Suspicion
Explanation
Suspicion is not a trait that contributes to the success of social engineering attacks. In fact, suspicion is a defense mechanism that can help individuals identify and avoid potential scams or manipulations. On the other hand, trust, social obligation, and ignorance are traits that can be exploited by social engineers to manipulate individuals into divulging sensitive information or performing actions that they wouldn't normally do.