A+ 902 Test 15 Flashcards
Phishing scams targeting a specific group of people are generally referred to as:
Spear phishing
An email sent from an unknown source disguised as the source known to the message receiver is an example of:
Spoofing
Social engineering
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?
SMTP
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:
Social engineering
Which of the following fall(s) into the category of social engineering attacks?
Spear phishing
Shoulder surfing
Tailgating
In computer security, a situation in which an unauthorized person is able to view another user’s display or keyboard to learn their password or other confidential information is known as:
Shoulder surfing
A zero-day attack exploits:
Vulnerability that is present in already released software but unknown to the software developer
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:
Zombie
Which of the following terms is used to describe a collection of intermediary compromised systems under control of a hacker?
Botnet
An attack against encrypted data that relies heavily on computing power in order to check all possible keys and passwords until the correct one is found is known as a brute-force attack.
True
Which of the password attacks listed below takes advantage of a predefined list of words?
Dictionary attack
What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software?
NAC
Which of the following answers refer(s) to the implementation of best security practices in a corporate environment?
User education Strong authentication Principle of least privilege Patch/update management Appropriate data destruction and disposal methods
What is tailgating?
Gaining unauthorized access to restricted areas by following another person
Which of the following is an example of active eavesdropping?
MITM
The term “Mantrap” refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.
True
Which of the security controls listed below is used to prevent tailgating?
Mantraps
Which of the following provides physical security measure against laptop theft?
Cable locks
Which of the tools listed below allows for secure disposal of physical documents?
Shredder
A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is called:
RFID badge
Privacy filter (aka privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle so data is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.
True
Which of the following prevention methods fall(s) into the category of physical security controls?
Key fob
Door lock
Biometrics
RFID badge
The two factors that are considered important for creating strong passwords are:
Password length
Password complexity
Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints (“something you are”), physical tokens such as smart cards (“something you have”), or user names and passwords (“something you know”). Additional factors might include geolocation (“somewhere you are”), or user-specific activity patterns, such as for example keyboard typing style (“something you do”). Multifactor authentication systems require implementation of authentication factors from two or more different categories.
True
Which of the following examples meets the requirement of multifactor authentication?
Password and biometric scan