3.1.11 Practice Questions Flashcards

1
Q

Social engineers are master manipulators. Which of the following are tactics they might use?

answer

Eavesdropping, ignorance, and threatening

Keylogging, shoulder surfing, and moral obligation

Shoulder surfing, eavesdropping, and keylogging

Moral obligation, ignorance, and threatening

A

Moral obligation, ignorance, and threatening

Explanation
Social engineers are master manipulators. Some of the most popular tactics they use are moral obligation, innate human trust, threatening, an easy reward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes a script kiddie?

answer

A hacker who uses scripts written by much more talented individuals.

A hacker willing to take more risks because the payoff is a lot higher.

A hacker who helps companies see the vulnerabilities in their security.

A hacker whose main purpose is to draw attention to their political views.

A

A hacker who uses scripts written by much more talented individuals.

Explanation
A script kiddie is a hacker who uses scripts written by much more talented individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any attack involving human interaction of some kind is referred to as:

answer

Attacker manipulation

A white hat hacker

Social engineering

An opportunistic attack

A

Social engineering

Explanation
Social engineering refers to any attack involving human interaction of some kind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Using a fictitious scenario to persuade someone to perform an action or give information they aren’t authorized to share is called:

answer

Pretexting

Preloading

Footprinting

Impersonation

A

Pretexting

Explanation
Pretexting is using a fictitious scenario to persuade someone to perform an action or give information they aren’t authorized to share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ron, a hacker, wants to get access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. Ron notices that June has a picture of a dog on her phone. He casually walks by and starts a conversation about dogs. Which phase of the social engineering process is Ron in?

answer

Elicitation phase

Research phase

Exploitation phase

Development phase

A

Development phase

Explanation
The development phase involves two parts: selecting individual targets within a company and forming a relationship with those individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are instant messaging a coworker, and you get a malicious link. Which type of social engineering attack is this?

answer

Spam

Spim

Hoax

Surf

A

Spim

Explanation
Spim is a malicious link sent to the target over instant messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brandon is helping Fred with his computer. He needs Fred to enter his username and password into the system. Fred enters the username and password while Brandon is watching him. Brandon explains to Fred that it is not a good idea to allow anyone to watch you type in usernames or passwords. Which type of social engineering attack is Fred referring to?

answer

Spam and spim

Keyloggers

Eavesdropping

Shoulder surfing

A

Shoulder surfing

Explanation
Shoulder surfing involves looking over someone’s shoulder while they work on a computer to see usernames, passwords, or account numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describes an inside attacker?

answer

A good guy who tries to help a company see their vulnerabilities.

An agent who uses their technical knowledge to bypass security.

An unintentional threat actor; the most common threat.

An attacker with lots of resources and money at their disposal.

A

An unintentional threat actor; the most common threat.

Explanation
An insider could be a customer, a janitor, or even a security guard, but most of the time, it’s an employee. Employees pose one of the biggest threats to any organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compliments, misinformation, feigning ignorance, and being a good listener are tactics of which social engineering technique?

answer

Elictitation

Impersonation

Preloading

Interrogation

A

Elictitation

Explanation
Elicitation is a technique that aims to extract information from a target without arousing suspicion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You get a call from one of your customers. The customer is asking about an employees username.

What should you do?

answer

You should put the caller on hold and then hang up.

You should provide the information as part of quality customer service.

You should not provide any information and forward the call to the help desk.

You should not provide any information except your manager’s name and number.

A

You should not provide any information and forward the call to the help desk.

Explanation
Every employee in the company should be taught that if somebody calls them and claims to be someone who needs employee information, especially usernames and passwords, they should forward that call to the help desk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Jason is at home, attempting to access the website for his music store. When he goes to the website, it has a simple form asking for name, email, and phone number. This is not the music store website. Jason is sure the website has been hacked. How did the attacker accomplish this hack?

answer

DNS cache poisoning

Social networking

Host file modification

Feigning ignorance

A

DNS cache poisoning

Explanation
In DNS cache poisoning, the attacker launches the attack on the chosen DNS server. Then, the attacker changes a target website’s IP address to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack that targets senior executives and high-profile victims is referred to as:

answer

Pharming

Vishing

Scrubbing

Whaling

A

Whaling

Explanation
Whaling is another form of phishing that targets senior executives and high-profile victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly