Chapter 10 - Social Engineering and Other Foes Flashcards

1
Q

What are the different types of Social Engineering Attacks?

A

page 356

  • Shoulder Surfing
  • Dumpster Diving
  • Tailgating
  • Impersonation
  • Hoaxes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Principles behind Social Engineering?

A

page 362

  • Authority - Trust
  • Intimidation - Scarcity
  • Consensus/Social Proof - Urgency
  • Familiarity/ Liking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At what frequency do the Proximity readers work at?

A

page 367
For smart cards = 13.56 MHz
For Proximity cards = 125 KHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a man-trap?

A

page 371

A series of interconnecting interlocks in which one door must close before another is opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is PDS?

A

page 376
Protected Distribution System
The network is secure enough to allow for the transmission of classified information in unencrypted format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is occasionally referred to as Wetware?

A

page 355

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What helps in decreasing shoulder surfing?

A

page 357

Privacy filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does CERT stand for?

A

page 359

Computer Emergency Readiness Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Whaling?

A

page 360
Instead of sending out a “To Whom It May Concern” message, the whaler identifies one person from whom they can gain all the data they want, usually the manager or owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Vishing?

A

page 360

Combined with phishing and VoIP, is an elevated form of social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the only preventive measure in dealing with Social Engineering?

A

page 365

Is to educate your users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are a few things to deter intruders from breaking into your building?

A

page 373

Install improved door locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Fire Extinguisher ratings?

A
page 378
A - Wood and Paper
B - Flammable Liquids
C - Electrical
D - Flammable Metals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the most common Fixed Systems for Fire Suppression?

A

page 379

Combine Fire Detectors with Fire Suppression systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RF desensitization?

A

page 381

When RF levels become to high that it can cause receivers in wireless units to become deaf.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TEMPEST-compliant?

A

page 382

Means that a computer system doesn’t emit any significant amount of EMI or RFI

17
Q

What are the different Control Types?

A
page 384
Deterrent
Preventive
Detective
Compensating
Technical
Administrative
18
Q

What are important administrative data policies to have in control?

A

page 385
Wiping - How is data removed from media?
Disposing - How are media are discarded when they are no longer needed.
Retention - How long must data be kept?
Storage - What is data kept and what security precaution are associated with its access?

19
Q

What are the three steps in Destroying Flash Drive?

A

page 387

  1. Crack Open the Drive
  2. Turn the Chip to Powder
  3. Finish it Off