Social Engineering and Physical Attacks Flashcards

1
Q

What is often the weakest link in organizations with the strongest technical barriers and sophisticated security systems?

A

Humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three layers of physical security?

A

Monitoring, such as surveillance and guards, Detecting, such as Closed-circuit televisions, cameras, and alarms; and Preventing, such as physical barriers, lighting, mechanical or electrical locking mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which NIST Special Publication provides a list of information security controls that are relevant to federal information systems, as well as organizations in the private sector?

A

800-53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which NIST publication provides standards for categorizing information and information systems based on impact levels of low, moderate, and high?

A

FIPS 99

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process of convincing someone to do something for you that they might not ordinarily want to do?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What technique is used to create a situation that may make a target more willing to comply with the needs of the social engineer? An example might be tricking a security guard into allowing you past an access point with a story like you are physically ill and need to use the restroom.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a technique to build trust that involves claiming to be a figure of authority or famous person… or, more subtly, using an available email address the target has never seen before by making it seem similar to an address they have seen.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five influential tactics and techniques used to exploit a target’s trust, as described by the Social Engineering Framework?

A

Authority, Scarcity, Social Proof, Likeness, and Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one of the most popular methods used for social engineering attack?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which kind of social engineering attack is a fraud technique delivered through email, phone, or text-message used to obtain sensitive information from a target?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three main characteristics of an email phishing attack?

A

Target, pretext, payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of phishing uses information about the organization or the individual to attempt to bypass security controls and establish a pretext that is likely to convince the user?

A

Spear-phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What kind of attack targets members of the organization who have elevated authority, such as executives or executive assistants?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of attack capitalizes on a target’s trust relationship with websites they commonly visit?

A

Watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an open-source Python-based framework for social engineering that is available by default on Kali Linux?

A

Social-Engineer Toolkit (SET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a tool that may be useful for web-based attacks using social engineering?

A

Browser Exploitation Framework (BeEF)

17
Q

What is a physical attack used in social engineering that involves digging through an organization’s dumpster or trash in order to retrieve sensitive information?

A

Dumpster Diving