4 - Social Engineering, Physical, and Password Attacks Flashcards

Compare and contrast types of social engineering techniques; analyze potential indicators to determine type of attacks; know how to use appropriate tools to assess security

1
Q

What is the best description of tailgating?

A

Following someone through a door they just unlocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When you combine phishing with Voice over IP, it is known as:

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Alan reads Susan’s password from across the room as she logs in. What type of technique has he used?

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Joanna recovers a password file with passwords stored as MD5 hashes. What tool can she use to crack the passwords?

A

John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technique is most commonly associated with the use of malicious flash drives by penetration testers?

A

Distributing them in parking lots as though they were dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration test. What technique has she used?

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ben searches through an org’s trash looking for sensitive documents, internal notes, and other useful info. What term describes this type of activity?

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Skimming attacks are often associated with what next step by attackers?

A

Cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Alaina suspects that her org may be targeted by a SPIM attack. What tech is she concerned about?

A

Spam over Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alex discovers that the network routers his org recently bought are running a modified firmware version that doesn’t match the hash provided by the manufacturer when he compares them. What type of attack should he categorize this as?

A

Supply Chain Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nicole accidentally types [www.smazon.com] into her browser and is immediately overwhelmed with ads and pop-ups. What type of attack has she just experienced?

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lucca’s org runs a hybrid datacenter with systems in Microsoft’s Azure cloud and in a local facility. What type of attack can he establish prevention/controls for in BOTH locations (physical and virtual)?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Alaina discovers someone has set up a website that looks exactly like her org’s banking website! What term describes this sort of cyber attack?

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Amanda receives a call from someone claiming to be a senior IT employee. They tell her to disable her company’s firewall due to an ongoing issue with their eCommerce website. Of course, after she does so, it turns out that the IT employee… was a penetrator hired by her company to test their security. What Social Engineering Principle is at work?

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of malicious actor is most likely to use hybrid warfare?

A

Nation-State Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sharif receives a bill for services that he does not believe his company requested or had performed. What type of Social Engineering technique is this?

A

Invoice Scam

17
Q

Naomi receives a report of smishing. What type of attack should she look for?

A

Text-message-based Phishing

18
Q

Charles wants to find out about security procedures in his company… secretly. He engages staff members in casual conversation, and because he’s so personable, he gets the info. What Social Engineering effort is at work?

A

Elicitation

19
Q

A caller claiming to be the president of the company demands access to his accounts, else a big deal will fall through SOON. Carlos, the cybersecurity officer, classifies this very important call as an attack. What Social Engineering Principle would his situation fall under?

A

Urgency

20
Q

What type of phishing targets specific groups of employees, such as all managers in the financial department of a company?

A

Spear Phishing