Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 1 Which of these is an example of social engineering? Phishing Virus Worm Trojan horse 1 points QUESTION 2 Impersonating someone's identity for the

QUESTION 1
Which of these is an example of social engineering?
Phishing
Virus
Worm
Trojan horse
1 points
QUESTION 2
Impersonating someone's identity for the purpose of gaining information is called:
Phishing
Spear phishing
Pretexting
Tailgating
1 points
QUESTION 3
Smishing attacks are carried out using what medium?
Email
Text messages
Websites
Voice
1 points
QUESTION 4
Which of these describes a threat actor redirecting a victim from a valid website to a malicious fake?
Dumpster diving
Tailgating
Pharming
Phishing
1 points
QUESTION 5
Whaling is most similar to which other kind of attack?
Credential harvesting
Watering hole attack
Shoulder surfing
Phishing
1 points
QUESTION 6
Which of these is NOT a type of social engineering attack?
Prepending
Piggybacking
Spear phishing
Pretexting
1 points
QUESTION 7
Which kind of attack targets users based on the common websites they frequent?
Pretexting
Watering hole attack
Eavesdropping
Vishing
1 points
QUESTION 8
A social engineer calls an IT specialist sounding panicked and stating that they are an employee who needs to get into their email account right away to address a time-sensitive request from an important client. Which motivation technique are they using?
Urgency
Scarcity
Authority
Intimidation
1 points
QUESTION 9
Which of these is NOT a best practice for avoiding social media attacks?
Never share passwords or PINs.
Shield keypads and screens when entering authentication information.
Examine any unknown removable media to make sure it does not contain malware.
Shred any sensitive information destined for garbage or recycling.
1 points
QUESTION 10
What government funded research association provides a set of matrices that document the tactics attackers use to compromise systems?
The MITRE Corporation
W3C
The Social Engineering Toolkit
MAL*WAR
Chapter 2: Analyzing Potential Indicators to Determine the Type of Attack
1 points
QUESTION 11
Ransomware is a type of what?
Cryptoviral extortion
Distributed denial of service attack
Worm
Trojan horse
1 points
QUESTION 12
Which of these is a program that appears useful but allows an attacker administrator-level access to a system?
Worm
Keylogger
Rainbow table
Remote access Trojan (RAT)
1 points
QUESTION 13
What is the purpose of a rootkit?
Encrypt important files and ask for payment to decrypt them
Spread virus code by attaching to executable files
Install at a low level and then perform malicious operations without being detected
Secretly record all keystrokes, including passwords
1 points
QUESTION 14
Which of these is a key characteristic of a worm?
Replicates by attaching itself to executable files
Self-replicates
Is able to crack weak passwords
Appears to be a legitimate program but contains malware
1 points
QUESTION 15
A keylogger is a form of what type of malware?
Spyware
Logic bomb
Virus
Ransomware
1 points
QUESTION 16
Suppose a user clicks on an offer to install a web browser toolbar that is supposed to provide helpful shortcuts, but a side effect is that it changes his default search engine to one owned by that company. What kind of malware is this an example of?
Ransomware
Grayware
Brute-force attack
Remote access Trojan
1 points
QUESTION 17
Which of these is an attack that attempts to discover a user's password?
Worm
Ransomware
Logic bomb
Rainbow table
1 points
QUESTION 18
Which of these is a type of attack that uses a physical device to do its work?
Logic bomb
Fileless virus
Skimming
Backdoor
1 points
QUESTION 19
Which of these attacks is a potential attack vector for an attack on a cloud computing system?
Session hijacking
Card cloning
PUP
Collision
1 points
QUESTION 20
What does a birthday attack target?
Local hard disk file system
Hashing system
Certain types of files, such as graphics
Physical equipment such as USB flash drives

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Secrets Of Analytical Leaders Insights From Information Insiders

Authors: Wayne Eckerson

1st Edition

1935504347, 9781935504344

More Books

Students also viewed these Databases questions

Question

Find m J, m L, and m M. M 100 K L

Answered: 1 week ago

Question

Did you add the logo at correct size and proportion?

Answered: 1 week ago

Question

Did you ask for action?

Answered: 1 week ago