Social Engineering PEs Flashcards
By only visiting websites via a trusted search engine and landing on legitimate pages you avoid drive by downloads entirely.
False
Spear phishing can be differentiated from other types of phishing by their use of the latest news sources to create a believable story.
False Its identifying specific individuals
Which DDoS attack spoofs the source address of a broadcast ping packet to overwhelm the victim with ping replies?
ICMP Flood
What is the distiguishing feature of a pretexting attack?
A story is devised to cast legitimacy and garnish cooperation during the interaction with the victim.
Which of the following is an attack involving leaving infected data storage devices near areas victims will cross, in hopes they will plug them into systems with valuable information?
Road Apple
Which measure(s) could be used to stop a DDoS attack against your device?
Make your device drop all ICMP packets
What are ways to help prevent pretexting attacks?
- Implement identity verification congruent with the security level being sought.
- Contact the inquisitor’s company by looking them up, and not a number given by the inquisitor.
- Calling your supervisor if unsure of how to proceed.
- All of the above.
All of the above.
What does the acronym DoS Stand for?
Denial of Service
Drive by downloads can occur even on legitimate websites without the hosting party’s knowledge.
True
Which of the following is an indicator that a received e-mail may be a Phishing attempt?
A claim that there’s a problem with your account and a link to a website.
What does the acronym DDoS Stand for?
Distributed Denial of Service
How can you help prevent drive by downloads?
Only use your admin account for program installations.
Which of the following measures is least likely to help against infected removable storage devices?
Have an approved software list.
Which of the following would not help preventing Phishing attempts?
Forwarding a suspected e-mail to a colleague to see what he thinks.
What do Drive-by downloads take advantage of:
- Insecure applications
- Outdated applications
- Vulnerable operating systems
- All of the above
All of the above