1.1.8: Other Social Engineering Attacks

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is a common feature of malicious documents used in credential harvesting? A) Embedded macros that download malware B) Incorrect grammar and typos C) Watermarked logos for legitimacy D) Encryption to protect the attacker's identity

A

What is credential harvesting? A) Collecting usernames and passwords stored on a user's device B) Stealing payment details through fake invoices C) Gaining physical access to a secure building D) Disrupting communications in a secure network

A

What is tailgating in the context of cybersecurity? A) Following an authorized person into a secure area without proper credentials B) Installing malware on a computer through email attachments C) Spoofing a website to collect user credentials D) Sending fake invoices to obtain payment details

A

Which of the following is a method attackers might use to successfully tailgate? A) Temporarily take up smoking to blend in with employees B) Use phishing emails to collect credentials C) Deploy ransomware to bypass physical security D) Use CAPTCHA bypass tools

A

Which tool might an attacker target to extract stored credentials? A) Windows Credential Manager B) The company's firewall C) Email spam filters D) The physical airlock system

A

In an invoice scam, the attacker often impersonates: A) A lower-level employee B) The company's CEO or another high-ranking official C) A social media influencer D) A third-party vendor delivering supplies

B

What is the purpose of an access control vestibule or airlock? A) To block phishing emails from reaching employees B) To prevent unauthorized access by allowing only one person through at a time C) To secure stored credentials on a user's device D) To monitor outgoing data traffic for sensitive information

B

How do attackers typically distribute credential-harvesting malware? A) By using fake invoices with payment links B) By tailgating into a secure area C) By sending a malicious Microsoft Word document with an embedded macro D) By impersonating IT support over the phone

C

Which of the following is NOT a recommended way to prevent tailgating? A) Implement a policy of "one scan, one person" B) Use access control vestibules or airlocks C) Require employees to use a shared badge for convenience D) Encourage employees to challenge unfamiliar individuals

C

What is an invoice scam? A) A technique used to bypass network firewalls B) A method of harvesting stored credentials from a user's device C) A phishing attack designed to impersonate technical support D) A type of attack where fake invoices are sent to trick businesses into making payments

D


Conjuntos de estudio relacionados

Nclex Review: Lower GI Problems - Intestinal Obstruction

View Set

SHRM CP - SCP - Organization - Organizational Development/Improving Org Performance/Improving Team Performance

View Set

BIOL 3150: Chapter 7 - From DNA to Protein: How Cells Read the Genome

View Set

Chapter 4: Structured Cabling and Networking Elements

View Set