ch 10 Flashcards
In which of the following phases of the social engineering attack cycle will an attacker require the most time investment?
Research
*Pic: this cycle might happen quickly over a few seconds, or take much longer, even years.
Which of the following methods requires the entry of a code to open a door?
Cipher Lock
or Keypad.
*Pic: a cipher lock can document who enters an area and when.
In which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur?
On-Path Attack
previously called a MitM (man-in-the-middle) attack.
EX: Evil Twin attack (type of On-Path attack).
You, as a network engineer, want to have an insight into your network’s weaknesses that need attention. You want to search for devices with open ports indicating which insecure service might be used to craft an attack and identify unencrypted sensitive data. Which of the following scanning tools will you use in this scenario?
Nessus
developed byL Tenable Security.
Nessus performs even more sophisticated vulnerability scans than Nmap. Among other things, Nessus can identify unencrypted, sensitive data (such as credit card numbers) saved on your network’s hosts. The program can run on your network or from off-site servers continuously maintained and updated by the developer.
Which of the following is not a social engineering strategy?
DoS (Denial-of-Service)
is an attack in which a legitimate user is unable to access normal network resources because of an attacker’s intervention. Most often, this type of attack is achieved by flooding a system with so many requests for services that it can’t respond to any of them.
At a security training exercise, you had to devise a strategy to penetrate into an organization’s data room by accessing one of their employee’s ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario?
Quid Pro Quo
Gary is a freelance network analyst. A client approaches him to provide a solution for his firm wherein employees have been found to carry sensitive information out of the office premises. This data breach has led to a lot of market speculations as a result of which there has been a significant drop in the share market prices of the company’s stocks. Gary is contracted to find a solution to this issue. Analyze which of the following options should be carried out by Gary keeping in mind the sensitivity of the situation.
Deploy a DLP solution.
DLP is a security technique that uses software to monitor confidential data, track data access and ownership, and prevent it from being copied or transmitted off the network.
As a network administrator, you have asked one of the contracted vendors of the company to ship a consignment of spare parts and components of all the network devices. You have decided to place this order to store the devices for a rainy day. Now, as the consignment has been received by your organization, you want to store these devices in a secure location. Which of the following will you use in this scenario?
Locking Cabinets
is a storage container secured by a locked panel or door that might be used to store documents or hardware not in use.
Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?
Honeypot
is a decoy system isolated from legitimate systems and designed to be vulnerable to security exploits for the purposes of learning more about hacking techniques or nabbing a hacker in the act.
You have been appointed as a network administrator at JJ Securities. The CEO of the company has requested your presence to address some security concerns. The CEO feels that certain members of the senior management who have access to privileged accounts might be under serious social engineering attacks by potential hackers. So, the CEO wants you to monitor the activities of these privileged accounts. Which of the following software will you use in this situation?
PAM (Privileged Account Management) tool
Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn’t yet or only very recently become public?
Zero-Day Exploit
Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?
Vulnerability
Chelsea is a hacker who befriends Adele McCain over lunch at the cafeteria. Adele is the senior associate of Spandangle Ltd., a private law firm based in Alabama. Chelsea manages to successfully guess Adele’s password to a sensitive database in the law firm. What kind of password attack did she use?
Brute-Force Attack
is an attempt to discover an encryption key or password by trying numerous possible character combinations until the correct combination is found.
Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?
CVE (Common Vulnerabilities and Exposures)
is a dictionary project funded by the U.S. Department of Homeland Security and managed by The MITRE Corporation to index cybersecurity vulnerabilities.
Andy Bryant is a network analyst at Freewoods Centre for Policy Research. There are approximately 35 employees currently working on various issues of policy making and research, and this requires access to the network’s resources. He has been asked to set a list of dos and don’ts for all the employees to clarify what is acceptable use of company IT resources and what is not. He also needs to explain penalties for violations and describe how these measures protect the network’s security. Analyze which of the following security policies Andy should implement in this scenario.
AUP (Acceptable Use Policy)
is the portion of a security policy that explains to users what they can and cannot do while accessing a network’s resources and the penalties for violations. It might also describe how these measures protect the network’s security.
Which of the following devices scans an individual’s unique physical characters such as iris color patterns to verify the person’s identity?
Biometrics