Ethical 12b Flashcards

1
Q

Which antiphishing tool is an enterprise-level solution that installs phishing sweeper clients throughout an organization?

A

Phishing Sweeper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Besides using decimal IP addresses, what other formats can an attacker use to trick a user into visiting an IP address by way of URL?

A

Octal Hexadecimal Dword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two online services can be used to provide a shortened third-party URL link to a phishing web page?

A

smallurl.com tinurl.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A large enterprise-sized client has asked you to provide software that will work throughout their domain to counter the threat of phishing attacks by managing workstation behavior and providing a centralized monitoring capability. What anti-phishing software should you use?

A

Phishing Sweeper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user has come to you and indicated that their corporate credit card was compromised after the user attempted to check the balance on the card. The user says that he clicked a link on a 3rd party web page that appeared to be legitimate, but actually lead to a phishing site. What most likely occurred?

A

A phisher utilized content injection to make the site appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following might be considered an antiphishing technique?

A

entering a URL in a browser manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What statement accurately describes how attackers exploit the use of IRC and instant messaging applications for phishing attempts?

A

Bots are utilized in popular channels and on popular applications to send fake information to many potential victims all at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of social engineering attack tricks users with offers of money or other inducements in order to get users to give them personal information?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In malware-based phishing, what technique can be used to redirect legitimate URLs to a malicious address?

A

Hosts File Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are planning to perform content-injection phishing in order to grab login information from your client’s users in order to demonstrate a vulnerability on their network. What statements describe actual means by which you could perform this attack?

A

Legitimate content can be replaced by malicious content through the use of a security vulnerability on the client’s web servers.

Create a phishing site, compromise a single user’s PC, and then use their corporate contact list to spread the phishing site throughout the client’s domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of phishing attack involves friendly login URLs, host name obfuscation, or bad domain names?

A

URL obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a reason for successful phishing?

A

lack of knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

According to Kaspersky Lab’s Spam Statistics Report Q2 2013, which country had the highest percentage of phishing attacks?

A

China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the first step that is performed when building a successful phishing site?

A

Register a fake domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of phishing attack makes use of a proxy server?

A

Man-in-the-Middle Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What factors are most likely to lead to a successful phishing attempt?

A

Use of deceptive graphical imagery and mimicry.

Exploitation of lack of knowledge on the part of the end user.

Exploitation of carelessness on the part of the end user.

17
Q

What is the primary vector for a typical phishing attack against an individual user?

A

An e-mail with a link that leads to a phishing website.

18
Q

Which application is usually exploited to conduct phishing attacks?

A

E-mail

19
Q

Which type of attack might provide a false secured-HTTPS wrapper or hide the source address in the attacker’s content server?

A

hidden frames

20
Q

What type of attack is carried out by targeting customers through a third-party Web site in which phishers may put banner ads on reputable sites, redirecting potential customers to a fake site?

A

Web-based delivery