4 - Social Engineering, Physical, and Password Attacks Flashcards
Compare and contrast types of social engineering techniques; analyze potential indicators to determine type of attacks; know how to use appropriate tools to assess security
What is the best description of tailgating?
Following someone through a door they just unlocked
When you combine phishing with Voice over IP, it is known as:
Vishing
Alan reads Susan’s password from across the room as she logs in. What type of technique has he used?
Shoulder Surfing
Joanna recovers a password file with passwords stored as MD5 hashes. What tool can she use to crack the passwords?
John the Ripper
What technique is most commonly associated with the use of malicious flash drives by penetration testers?
Distributing them in parking lots as though they were dropped
Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration test. What technique has she used?
Watering Hole Attack
Ben searches through an org’s trash looking for sensitive documents, internal notes, and other useful info. What term describes this type of activity?
Dumpster Diving
Skimming attacks are often associated with what next step by attackers?
Cloning
Alaina suspects that her org may be targeted by a SPIM attack. What tech is she concerned about?
Spam over Instant Messaging
Alex discovers that the network routers his org recently bought are running a modified firmware version that doesn’t match the hash provided by the manufacturer when he compares them. What type of attack should he categorize this as?
Supply Chain Attack
Nicole accidentally types [www.smazon.com] into her browser and is immediately overwhelmed with ads and pop-ups. What type of attack has she just experienced?
Typosquatting
Lucca’s org runs a hybrid datacenter with systems in Microsoft’s Azure cloud and in a local facility. What type of attack can he establish prevention/controls for in BOTH locations (physical and virtual)?
Phishing
Alaina discovers someone has set up a website that looks exactly like her org’s banking website! What term describes this sort of cyber attack?
Pharming
Amanda receives a call from someone claiming to be a senior IT employee. They tell her to disable her company’s firewall due to an ongoing issue with their eCommerce website. Of course, after she does so, it turns out that the IT employee… was a penetrator hired by her company to test their security. What Social Engineering Principle is at work?
Authority
What type of malicious actor is most likely to use hybrid warfare?
Nation-State Actor