Chapter 2: Pervasive Attack Surfaces & Controls Flashcards

1
Q

What is Social Engineering?

A

Means of eliciting info or convincing a user to take action that weakens security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Phishing?

A

Sending Fraudulent messages/emails to elicit personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is BEC?

A

Business Email Compromise - takes advantage of electronic payments or transferring funds - Request for funds appear to come from a legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is typo squatting?

A

Similar names of trusted sites (google.com to goggle.com)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cybersquatting?

A

Registering a domain that contains trademarks and then selling it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is bit flipping?

A

Flipping memory (1’s and 0’s) of a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Pharming?

A

URL Redirection (DNS infection) - typing one site and going to another site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a faraday cage?

A

A metallic enclosure that prevents the entry or escape of an electromagnetic field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a PDS?

A

Protective Distribution System - system of cable units to protect classified info transmitted between two areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hardened Carrier PDS?

A

Special electrical metalic tubing in the conduit to prevent physical tampering and protect the data cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Alarmed Carrier PDS?

A

Optical fibers in the conduit that transmits a noise that triggers an alarm if someone tries to gain physical access to the conduit (Best for classified info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the description of the Confidential data classification?

A

Highest level of data sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the description of the Private data classification?

A

Restricted with medium level of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the description of the Sensitive data classification?

A

should be restricted to employees who have a business need to access the data with prior approval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the description of the Critical data classification?

A

Data classified based on availability needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the description of the Restricted data classification?

A

Data not available to the public

17
Q

What is data segmentation?

A

Tagging data with classification then separating most sensitive data from the rest of the data

18
Q

What is a pretexting?

A

Impersonation/Masquerading as a real or fictitious character to a threat vector to obtain private information