Exam 4: The Role of People in Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Social engineers attempt to exploit the natural tendencies of people.They do this by

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

A

_______________ is the simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

Piggybacking

When an attacker tries to position himself behind a user so that he can see what keys are being typed or what information is on the screen is called _______________

Free
(Short Answer)
4.8/5
(34)
Correct Answer:
Verified

shoulder su rfing

_______________ is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.

(Short Answer)
4.8/5
(32)

Social engineers attempt to convince authorized individuals to provide confidential information or access to an unauthorized individual.

(True/False)
4.8/5
(32)

_______________ is when an e-mail trying to get sensitive information is sent to a group that has something in common,making the attack seem more personal.

(Short Answer)
4.9/5
(31)

Which of the following is NOT an example of a poor security practice?

(Multiple Choice)
5.0/5
(39)

A good security practice is to choose one good password and use it for all of your various accounts.

(True/False)
4.7/5
(35)

What is a good first step for companies to take to fight potential social engineering attacks?

(Multiple Choice)
4.7/5
(42)

Leaving sensitive information in a car is appropriate if the doors are locked and the files are not in plain view.

(True/False)
4.8/5
(35)

An attacker posts a flier offering services to clean computers of a virus that is sweeping the Internet,speeding them up as a result.A person concerned that he may have the virus because his computer was running slow,calls the attacker,asking for help.This is an example of ___________________.

(Short Answer)
4.9/5
(34)

What are the dangers of non-employees having physical access? Give examples.

(Essay)
5.0/5
(36)

When an attacker attempts to get credit card numbers using telephone and voice technologies,it's called

(Multiple Choice)
4.8/5
(43)

All of the following are techniques used by a social engineer EXCEPT:

(Multiple Choice)
4.8/5
(34)

Dumpster diving is when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.

(True/False)
4.8/5
(34)

Give an example of a hoax and how it might actually be destructive.

(Essay)
4.8/5
(32)

A(n)_______________ is an avenue that can be used to access a system while circumventing normal security mechanisms,and can often be used to install additional executable files.

(Short Answer)
4.8/5
(41)

An attacker watches people as they enter a building requiring a key card.He waits until he see someone who appears to be in a rush and has their hands full.He then intercepts the person,makes quick small talk,offers to help them hold what's in their hands while he swipes in,and follows behind.This is an example of

(Multiple Choice)
4.9/5
(37)

Your boss saw a TV show that mentioned the term "social engineering." He wants to know what it is and how it might be used against the company.

(Essay)
4.8/5
(34)

Hoaxes,while a potential nuisance,can not cause any real harm to your data.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)