Social Engineering & Malware Flashcards
Which Kali Linux command is used to clone a site in an attempt to harvest user credentials?
- chmod
- hydra
- setoolkit
- nc
setoolkit
Which type of DNS record query should always be considered to be suspicious?
- A
- AAA
- TXT
- PTR
TXT
Which type of malware appears benign but in fact is not?
- Trojan
- Ransomware
- Virus
- Worm
Trojan
Which details can indicate that an email message is a phishing attempt?
- Bad grammar
- Company logos
- Abnormal email addresses
- Date and time stamps
Bad grammar
Abnormal email addresses
As a help desk technician, you are attempting to install a new corporate-sanctioned app on a user station, but the virus scanner prevents the installation from completing. What should you do?
- Do not install the app
- Disable real-time virus threat protection
- Uninstall the virus protection and install the app
- Determine the folder the app installer is writing to and add it as an exclusion
Determine the folder the app installer is writing to and add it as an exclusion
Which type of attack attempts to trick users with what appears to be a legitimate email message?
- APT
- Phishing
- Ransomware
- Reverse shell
Phishing