14.5 Social Engineering Attacks 14.5.7 Practice Questions LabSim

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Vishing

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred?

Evil Twin

At company headquarters, several employees are having issues with their Wi-Fi access suddenly dropping and then reconnecting to the same wireless network. You decide to investigate and determine that someone has set up a rogue access point near company headquarters and is using it to capture sensitive data from the company network. Which type of social engineering attack is being used?

Unprotected

What do you call a system that has no anti-malware or firewall installed?

-Improper Disposal -Data Leakage -Number of Different Devices

Which of the following are risks of implementing a BYOD policy?

Zero-Day Attack

Which of the following attacks exploits a vulnerability in software that has not been discovered by the developer?

Phishing

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Mobile Device Management

Which of the following should you implement to monitor and manage the risks of a BYOD policy?

Application Layer

Which type of DoS attack exhausts the target's resources by overloading a specific program or service?

Evil Twin Attack

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out?

SQL Injection

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of?


Kaugnay na mga set ng pag-aaral

Chapter 16: Care of Postoperative Patients

View Set

Social influence - ethical and methodological issues with the studies used.

View Set

Fetal Gas Exchange and Circulation

View Set

Rockhurst Wilcox Earth Science 2nd Semester Final Review

View Set

Give Me Liberty Ch. 8 Review Quiz

View Set

Intermediate Accounting II Final

View Set

RN Pediatric Nursing Online practice 2023A

View Set