Exam 4: The Role of People in Security
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Social engineers attempt to exploit the natural tendencies of people.They do this by
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
A
_______________ is the simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Piggybacking
When an attacker tries to position himself behind a user so that he can see what keys are being typed or what information is on the screen is called _______________
Free
(Short Answer)
4.8/5
(34)
Correct Answer:
shoulder su rfing
_______________ is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
(Short Answer)
4.8/5
(32)
Social engineers attempt to convince authorized individuals to provide confidential information or access to an unauthorized individual.
(True/False)
4.8/5
(32)
_______________ is when an e-mail trying to get sensitive information is sent to a group that has something in common,making the attack seem more personal.
(Short Answer)
4.9/5
(31)
Which of the following is NOT an example of a poor security practice?
(Multiple Choice)
5.0/5
(39)
A good security practice is to choose one good password and use it for all of your various accounts.
(True/False)
4.7/5
(35)
What is a good first step for companies to take to fight potential social engineering attacks?
(Multiple Choice)
4.7/5
(42)
Leaving sensitive information in a car is appropriate if the doors are locked and the files are not in plain view.
(True/False)
4.8/5
(35)
An attacker posts a flier offering services to clean computers of a virus that is sweeping the Internet,speeding them up as a result.A person concerned that he may have the virus because his computer was running slow,calls the attacker,asking for help.This is an example of ___________________.
(Short Answer)
4.9/5
(34)
What are the dangers of non-employees having physical access? Give examples.
(Essay)
5.0/5
(36)
When an attacker attempts to get credit card numbers using telephone and voice technologies,it's called
(Multiple Choice)
4.8/5
(43)
All of the following are techniques used by a social engineer EXCEPT:
(Multiple Choice)
4.8/5
(34)
Dumpster diving is when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.
(True/False)
4.8/5
(34)
A(n)_______________ is an avenue that can be used to access a system while circumventing normal security mechanisms,and can often be used to install additional executable files.
(Short Answer)
4.8/5
(41)
An attacker watches people as they enter a building requiring a key card.He waits until he see someone who appears to be in a rush and has their hands full.He then intercepts the person,makes quick small talk,offers to help them hold what's in their hands while he swipes in,and follows behind.This is an example of
(Multiple Choice)
4.9/5
(37)
Your boss saw a TV show that mentioned the term "social engineering." He wants to know what it is and how it might be used against the company.
(Essay)
4.8/5
(34)
Hoaxes,while a potential nuisance,can not cause any real harm to your data.
(True/False)
4.8/5
(35)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)