Social Engineering and Other Foes (Ch. 10) Flashcards

1
Q

A control implemented through administrative policies or procedures.

A

administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A physical security deterrent used to protect a computer.

A

cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server room aisles that blow cold air from the floor or aisles in which the fronts of the devices face the AC ouput

A

cold aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gap controls that fill in the coverage between other types of vulnerability mitigation techniques.

A

compensating controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Processes or actions used to respond to situations or events.

A

control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technical, physical, or administrative measures in place to assist with resource management.

A

control types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Getting rid of/destroying media no longer needed.

A

data disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Controls that are intended to identify and characterize an incident in progress (for example, sounding the alarm and alerting the administrator).

A

detective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Looking through trash for clues often in the form of paper scraps to find users passwords and other pertinent information.

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An electrically conductive wire mesh or other conductor woven into a cage that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls.

A

Faraday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The act of stopping a fire and preventing it from spreading.

A

fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typically, an email message warning of something that isn’t true, such as an outbreak of a new virus. A hoax can send users into a panic and cause more harm than the virus.

A

hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A server room aisle in which the hot air exhaust of devices face the warm air return of an AC

A

hot aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pretending to be another person to gain information.

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of determining what information is accessible, to what parties, and for what purposes.

A

information classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A device, such as a small room, that limits access to one or a few individuals.

A

mantrap

17
Q

The correct method of extinguishing a fire with an extinguisher: Pull, Aim, Squeeze, and Sweep.

A

PASS method

18
Q

Security set up on the outside of the network or server to protect it.

A

perimeter security

19
Q

ard required of federal employees and contractors to gain access (physical and logical) to government resources.

A

Personal Identity Verification (PIV) C

20
Q

Information that can be uniquely used to identify, contact, or locate a single person. Examples include Social Security number, driver’s license number, fingerprints, and handwriting.

A

personally identifiable information (PII)

21
Q

A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.

A

phishing

22
Q

ontrols and countermeasures of a tangible nature intended to minimize intrusions.

A

physical controls C

23
Q

Controls intended to prevent attacks or intrusions.

A

preventive controls

24
Q

A state of security in which information isn’t seen by unauthorized parties without the express permission of the party involved.

A

privacy

25
Q

Screens that restrict viewing of monitors to only those sitting in front of them.

A

privacy filters

26
Q

Cameras that can pan, tilt, and zoom.

A

PTZ

27
Q

Information that isn’t made available to all and to which access is granted based on some criteria.

A

restricted information

28
Q

Watching someone when they enter their username, password, or sensitive data.

A

shoulder surfing

29
Q

An attack that uses others by deceiving them. It does not directly target hardware or software, but instead it targets and manipulates people.

A

social engineering

30
Q

A form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.

A

spear phishing

31
Q

Following someone through an entry point.

A

tailgating

32
Q

Controls that rely on technology.

A

technical controls

33
Q

Combining phishing with Voice over IP (VoIP).

A

vishing

34
Q

Identifying a site that is visited by those that they are targeting, poisoning that site, and then waiting for the results.

A

watering hole attack

35
Q

Another term for social engineering.

A

wetware

36
Q

Targeting employees in an organization that would more likely lead to the divulgement of sensitive information. Typically managers, supervisors or high-level executives

A

whaling