2.2.4, 2.2.5, 5.6.2 Flashcards

1
Q

What is the key difference between misinformation and disinformation in the context of cybersecurity?

A

Misinformation is unintentional, while disinformation is intentional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of impersonation in cybersecurity attacks?

A

Pretending to be a high-level executive and requesting financial transactions or sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is tailgating, also known as piggybacking, in the context of cybersecurity?

A

Gaining entry to a restricted area without proper authentication by following an authorized person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common tactic used in impersonation attacks?

A

Demanding immediate action or access by making it appear to be an emergency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary goal of business email compromise (BEC. attacks)?

A

Gaining unauthorized access to business email accounts for financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can organizations mitigate the risk of tailgating attacks?

A

Establishing clear verification processes for access to restricted areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the goal of brand impersonation attacks in cybersecurity?

A

To trick individuals into divulging sensitive information or distributing malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the best defense against impersonation attacks?

A

Checking credentials, calling for proof, and verifying the identity of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a key characteristic of watering hole attacks?

A

They leverage common websites or resources frequented by the intended victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do watering hole attacks take advantage of human behavior?

A

By relying on users’ habitual visits to specific websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is typosquatting, also known as URL hijacking?

A

Slightly changing the URL of a website to resemble a well-known site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can users defend against watering hole attacks?

A

By being proactive and diligent in updating software and detecting unusual activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is clickjacking in the context of client hijacking attacks?

A

Manipulating computers into clicking on hidden buttons or links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does session hijacking occur in client hijacking attacks?

A

By stealing cookies to authenticate users on a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one of the key objectives of engaging sessions for security awareness training?

A

Developing a keen eye for abnormal behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can organizations promote continuous learning in security practices?

A

Through regular interactive training sessions.

17
Q

What is one way to integrate insider threat awareness into training programs?

A

Implementing sophisticated monitoring mechanisms.

18
Q

How can organizations encourage strong password management practices?

A

By equipping employees with the knowledge and skills to create and maintain secure passwords.

19
Q

What is the purpose of conducting simulated phishing campaigns?

A

To serve as educational tools for employees.

20
Q

How can organizations adapt security practices for remote work environments?

A

By providing guidelines for securing home offices and remote connections.

21
Q

What is the purpose of setting up effective mechanisms for reporting and monitoring security incidents?

A

To ensure swift and accurate reporting of security concerns.

22
Q

How can organizations integrate security training throughout the employee lifecycle?

A

By integrating comprehensive security training during onboarding and regular sessions.

23
Q

What contributes to creating a resilient security environment within organizations?

A

Clear policies and proactive monitoring.

24
Q

How can organizations foster a culture of security consciousness among employees?

A

By promoting continuous education and clear policies.