Review 3 Flashcards

1
Q

Which type of backup run daily and backs up every file that changed since last full backup?

System

Full

Differential

Incremental

A

Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT one of the three main phases of social engineering?

Exploitation

Research

Entrusting

Development

A

Entrusting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which social engineering term refers to creating a fictitious scenario to use on target?

Question options:

Pretexting

Impersonation

Preloading

Elicitation

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of attacker often utilizes “opportunistic” attacks?

Organized crime

Single hacker

Nation state

Insiders

A

Single hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a recommended practice when hiring a new employee?

Question options:

Contact references

Sign a Non-Disclosure Agreement (NDA)

Implement an Acceptable Use Policy (AUP)

All of these

A

All of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT one of the three factors to keep in mind with physical security?

Question options:

Robustness

Recovery

Detection

Prevention

A

Robustness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of social engineering attack attempts to capture usernames and passwords?

Question options:

Spam

Eavesdropping

Keylogger

USB

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which one of the following is NOT one of the manipulation and motivation techniques used in Social Engineering?

Question options:

Ignorance

Patriotism

Moral obligation

Trust

A

Patriotism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term refers to an attacker enticing or manipulating people to perform tasks or relay information?

Question options:

Social Attack

Social Enticement

Social Engineering

Social Manipulation

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one of the most common ways to pick a lock?

Question options:

Lock shim

None of these

Scrubbing

Bump key

A

Scrubbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to the lecture, what term refers to an easy physical barrier that deters aggressive intruders?

Question options:

Surveillance systems

Bollards

Locks

Man-traps

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In which phase of the social engineering process is “footprinting” utilized?

Question options:

Research

Exploitation

Development

Entrustment

A

Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of attack is typically automated and involves scanning a wide range of systems for known vulnerabilities?

Question options:

Opportunistic

Automated

Targeted

Elicitation

A

Opportunistic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What term refers to “a process in which controls are implemented in layers to ensure that defeating one level of security does not allow an attacker subsequent access”?

Question options:

Layered security

Multi-layered security

Defense in depth

Physical security

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which social engineering term refers to influencing a target’s thoughts, opinions, and emotions?

Question options:

Impersonation

Preloading

Pretexting

Elicitation

A

Preloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly