Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 1 Which of these is an example of social engineering? Phishing Virus Worm Trojan horse 1 points QUESTION 2 Impersonating someone's identity for the
QUESTION
Which of these is an example of social engineering?
Phishing
Virus
Worm
Trojan horse
points
QUESTION
Impersonating someone's identity for the purpose of gaining information is called:
Phishing
Spear phishing
Pretexting
Tailgating
points
QUESTION
Smishing attacks are carried out using what medium?
Email
Text messages
Websites
Voice
points
QUESTION
Which of these describes a threat actor redirecting a victim from a valid website to a malicious fake?
Dumpster diving
Tailgating
Pharming
Phishing
points
QUESTION
Whaling is most similar to which other kind of attack?
Credential harvesting
Watering hole attack
Shoulder surfing
Phishing
points
QUESTION
Which of these is NOT a type of social engineering attack?
Prepending
Piggybacking
Spear phishing
Pretexting
points
QUESTION
Which kind of attack targets users based on the common websites they frequent?
Pretexting
Watering hole attack
Eavesdropping
Vishing
points
QUESTION
A social engineer calls an IT specialist sounding panicked and stating that they are an employee who needs to get into their email account right away to address a timesensitive request from an important client. Which motivation technique are they using?
Urgency
Scarcity
Authority
Intimidation
points
QUESTION
Which of these is NOT a best practice for avoiding social media attacks?
Never share passwords or PINs.
Shield keypads and screens when entering authentication information.
Examine any unknown removable media to make sure it does not contain malware.
Shred any sensitive information destined for garbage or recycling.
points
QUESTION
What government funded research association provides a set of matrices that document the tactics attackers use to compromise systems?
The MITRE Corporation
WC
The Social Engineering Toolkit
MALWAR
Chapter : Analyzing Potential Indicators to Determine the Type of Attack
points
QUESTION
Ransomware is a type of what?
Cryptoviral extortion
Distributed denial of service attack
Worm
Trojan horse
points
QUESTION
Which of these is a program that appears useful but allows an attacker administratorlevel access to a system?
Worm
Keylogger
Rainbow table
Remote access Trojan RAT
points
QUESTION
What is the purpose of a rootkit?
Encrypt important files and ask for payment to decrypt them
Spread virus code by attaching to executable files
Install at a low level and then perform malicious operations without being detected
Secretly record all keystrokes, including passwords
points
QUESTION
Which of these is a key characteristic of a worm?
Replicates by attaching itself to executable files
Selfreplicates
Is able to crack weak passwords
Appears to be a legitimate program but contains malware
points
QUESTION
A keylogger is a form of what type of malware?
Spyware
Logic bomb
Virus
Ransomware
points
QUESTION
Suppose a user clicks on an offer to install a web browser toolbar that is supposed to provide helpful shortcuts, but a side effect is that it changes his default search engine to one owned by that company. What kind of malware is this an example of
Ransomware
Grayware
Bruteforce attack
Remote access Trojan
points
QUESTION
Which of these is an attack that attempts to discover a user's password?
Worm
Ransomware
Logic bomb
Rainbow table
points
QUESTION
Which of these is a type of attack that uses a physical device to do its work?
Logic bomb
Fileless virus
Skimming
Backdoor
points
QUESTION
Which of these attacks is a potential attack vector for an attack on a cloud computing system?
Session hijacking
Card cloning
PUP
Collision
points
QUESTION
What does a birthday attack target?
Local hard disk file system
Hashing system
Certain types of files, such as graphics
Physical equipment such as USB flash drives
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started