Review 3 Flashcards
Which type of backup run daily and backs up every file that changed since last full backup?
System
Full
Differential
Incremental
Differential
Which of the following is NOT one of the three main phases of social engineering?
Exploitation
Research
Entrusting
Development
Entrusting
Which social engineering term refers to creating a fictitious scenario to use on target?
Question options:
Pretexting
Impersonation
Preloading
Elicitation
Pretexting
Which type of attacker often utilizes “opportunistic” attacks?
Organized crime
Single hacker
Nation state
Insiders
Single hacker
Which of the following is a recommended practice when hiring a new employee?
Question options:
Contact references
Sign a Non-Disclosure Agreement (NDA)
Implement an Acceptable Use Policy (AUP)
All of these
All of these
Which of the following is NOT one of the three factors to keep in mind with physical security?
Question options:
Robustness
Recovery
Detection
Prevention
Robustness
Which type of social engineering attack attempts to capture usernames and passwords?
Question options:
Spam
Eavesdropping
Keylogger
USB
Keylogger
Which one of the following is NOT one of the manipulation and motivation techniques used in Social Engineering?
Question options:
Ignorance
Patriotism
Moral obligation
Trust
Patriotism
What term refers to an attacker enticing or manipulating people to perform tasks or relay information?
Question options:
Social Attack
Social Enticement
Social Engineering
Social Manipulation
Social Engineering
What is one of the most common ways to pick a lock?
Question options:
Lock shim
None of these
Scrubbing
Bump key
Scrubbing
According to the lecture, what term refers to an easy physical barrier that deters aggressive intruders?
Question options:
Surveillance systems
Bollards
Locks
Man-traps
Bollards
In which phase of the social engineering process is “footprinting” utilized?
Question options:
Research
Exploitation
Development
Entrustment
Research
Which type of attack is typically automated and involves scanning a wide range of systems for known vulnerabilities?
Question options:
Opportunistic
Automated
Targeted
Elicitation
Opportunistic
What term refers to “a process in which controls are implemented in layers to ensure that defeating one level of security does not allow an attacker subsequent access”?
Question options:
Layered security
Multi-layered security
Defense in depth
Physical security
Defense in depth
Which social engineering term refers to influencing a target’s thoughts, opinions, and emotions?
Question options:
Impersonation
Preloading
Pretexting
Elicitation
Preloading