Cyberfraud Flashcards
Pharming is a type of attack in which users are fooled into entering sensitive data into a malicious website that imitates a legitimate website.
A. True
B. False
True
Matthew receives a voice mail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Of which of the following types of schemes has Matthew become the target?
A. Pharming
B. Vishing
C. Smishing
D. Spear phishing
B. Vishing
Which of the following is a technical security control that involves application-level controls implemented to prevent data from being accessed, stolen, modified, or deleted by unauthorized users?
A. Multifactor authentication
B. Data classification
C. Application security
D. Network security
C. Application security
Vishing is a type of phishing scheme that uses text messages or other short message systems to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity.
A. True
B. False
False
Which of the following is an administrative security control that an organization’s management can implement?
A. Creating an incident response plan
B. Issuing smart access cards to employees
C. Installing a firewall for the network
D. Backing up system files regularly
A. Creating an incident response plan
Which of the following activities does NOT typically occur during the containment and eradication step of the recommended methodology for responding to cybersecurity incidents?
A. Limiting the damage caused by the attack
B. Restoring control of the affected systems
C. Identifying all breaches that occurred
D. Notifying the appropriate internal personnel
C. Identifying all breaches that occurred
Which of the following is the MOST ACCURATE definition of a Trojan horse?
A. A program or command procedure that appears useful but contains hidden code that causes damage
B. A software program that contains various instructions that are executed every time a computer is turned on
C. A virus that changes its structure to avoid detection
D. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
A. A program or command procedure that appears useful but contains hidden code that causes damage
All the following are best practices for ensuring separation of duties within the information systems department and between IT and business unit personnel EXCEPT:
A. End users should not have access to production data outside the scope of their normal job duties.
B. Program developers should not be responsible for testing programs.
C. IT departments should not overlap with information user departments.
D. Only programmers should be server administrators.
D. Only programmers should be server administrators.
Which of the following is the MOST ACCURATE definition of spyware?
A. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
B. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers
C. A program or command procedure that appears useful but contains hidden code that causes damage
D. Any software application that displays advertisements while it is operating
A. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
A data classification policy can BEST be described as a(n):
A. Technical security control
B. Physical security control
C. Application security control
D. Administrative security control
D. Administrative security control
Which of the following BEST describes phishing?
A. A method for acquiring sensitive information needed to facilitate a specific scheme by searching through large quantities of available data
B. A method for acquiring sensitive information in which an attacker hides near the target to gain unauthorized access to a computer system
C. A method for acquiring sensitive information by bypassing a computer system’s security using an undocumented operating system and network functions
D. A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business
D. A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business
Which of the following types of malware can be used to generate illicit income in the form of cryptocurrency while slowing an infected computer and causing victims to incur costs related to power usage or cloud storage?
A. Spyware
B. Coin miners
C. Overwrite viruses
D. Keyloggers
B. Coin miners
Which of the following BEST describes social engineering?
A. A method for gaining unauthorized access to a computer system in which an attacker hides near the target to obtain sensitive information that they can use to facilitate their intended scheme
B. A method for gaining unauthorized access to a computer system in which an attacker bypasses a system’s security using an undocumented operating system and network functions
C. A method for gaining unauthorized access to a computer system in which an attacker searches through large quantities of available data to find sensitive information that they can use to facilitate their intended scheme
D. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme
D. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme
Which of the following refers to the type of network security systems that are designed to supplement firewalls and other forms of network security by detecting malicious activity coming across the network or on a host?
A. Intrusion detection systems
B. Intrusion admission systems
C. Network access controls
D. Network address prevention systems
A. Intrusion detection systems
Which of the following is a type of physical access control device that can be used to control access to physical objects?
A. Locks and keys
B. Electronic access cards
C. Biometric systems
D. All of the above
D. All of the above