A+ 902 Test 15 Flashcards
Phishing scams targeting a specific group of people are generally referred to as:
Spear phishing
An email sent from an unknown source disguised as the source known to the message receiver is an example of:
Spoofing
Social engineering
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?
SMTP
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:
Social engineering
Which of the following fall(s) into the category of social engineering attacks?
Spear phishing
Shoulder surfing
Tailgating
In computer security, a situation in which an unauthorized person is able to view another user’s display or keyboard to learn their password or other confidential information is known as:
Shoulder surfing
A zero-day attack exploits:
Vulnerability that is present in already released software but unknown to the software developer
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:
Zombie
Which of the following terms is used to describe a collection of intermediary compromised systems under control of a hacker?
Botnet
An attack against encrypted data that relies heavily on computing power in order to check all possible keys and passwords until the correct one is found is known as a brute-force attack.
True
Which of the password attacks listed below takes advantage of a predefined list of words?
Dictionary attack
What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software?
NAC
Which of the following answers refer(s) to the implementation of best security practices in a corporate environment?
User education Strong authentication Principle of least privilege Patch/update management Appropriate data destruction and disposal methods
What is tailgating?
Gaining unauthorized access to restricted areas by following another person
Which of the following is an example of active eavesdropping?
MITM