Unit 3 Practice Ethical Hacker

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are a security consultant hired to evaluate physical security. All employees must pass a locked door to enter the work area, restricted using a bio fingerprint lock. The receptionist is next to this door, and she uses an Ipad to log security events and complete other tasks. What could be done to add additional security?

Train receptionist to keep Ipad in a locked drawer

What best describes a lock shim?

A thin stiff piece of metal

Joe is often called away from his desk. Joe doesn't want to sign out of his computer every-time he leaves. What is best for securing Joe's workstation?

Configure screen saver to require password

Jason, at home, is attempting to access his music website, where it has a simple form asking for his name email and phone number. Jason knows this isn't the website and that it has been hacked. How was this accomplished?

DNS cache poisoning

Attackers targeting high profile victims and senior executives is known as?

Whaling

Ron wants to get access to a law firm when June is having lunch in her office. Ron notices a dog on June's phone and starts a conversation on dogs. What phase of social engineering is this?

Developmemt

Cctv can be preventive (live events) or investigative (record events for playback). What camera is more vandal resistant?

Dome camera

You get a call from you best customer. They are asking about your company's employees teams and managers. What should you do?

Don't provide any information and forward the call to the help desk.

Compliments, misinfo, feigning ignorance, and being a good listener are tactics of which social engineering technique?

Elicitation

Emergency lighting on protected power that auto turns on when the power goes off is part of which physical control?

Employee/visitor safety

What best describes a script kiddie?

Hacker using scripts written by much more talented individuals

You are implementing procedures requiring employee authentication. You observe employees holding the door for others to pass through. What training should you do?

How to prevent piggybacking/tailgating

You have implemented regular backups for a Windows system, done daily with an image backup weekly. Your company has decided not to store redundant copies of the backup media off-site. What would be the best backup storage?

Incremental, storing them in a locked fireproof safe

What best describes a physical barrier used to deter aggressive intruders?

Large flowerpots

When going to work, Angela realizes she forgot the company laptop at the coffee shop. What type of threat has she caused?

Man made

When reviewing cameras, you notice a person piggybacking who had no security badge. What can be implemented to prevent this?

Mantraps

Social engineers are master manipulators. What techniques might they use?

Moral obligation ignorance and threatening

The US DoC has an agency with the goal of protecting organizational operations assets and individuals from threats like malicious cyber attacks natural disasters structural failures and human error. What agency was created for this purpose?

NIST

What type of attack involves changing the boot order on a PC to gain computer access by bypassing the operating system?

Physical

Using a fictitious scenario to persuade people to perform actions or give info they aren't authorized to share is?

Pretexting

Important aspects of physical security include?

Preventing interruptions of service caused bu problems like fire

What are three factors to keep in mind with physical security?

Prevention detection and recovery

A person has jumped the fence but was detained by a security guard shortly after. What area of physical security is the guard in?

Security sequence

Brandon helps Fred with his computer and as Fred is typing in his login info Brandon watches him. Brandon tells Fred its not good to have people watch you type. What social engineering attack is this?

Shoulder surfing

You have DVDs with files from your latest project and you need to prevent from sensitive information from being compromised. What should you do?

Shred discs

Attacks involving human interaction are?

Social engineering

You instant message a coworker and get a malicious link. What type of social engineering attack is this?

Spim

What best describes an inside attacker?

Unintentional threat actor, most common threat.


Set pelajaran terkait

chkpt 3 Financial Accounting Exam

View Set

exam #2 musculoskeletal part medsurgII

View Set

Chapter 9 - Real Estate Contracts Practice Questions

View Set

Psychology of Advertising- Chapter 12

View Set

Psych Ch. 13- Feeding and Eating Disorders

View Set

Chem Exam #2 CH 14, ExAM #2 CH 13, Chem Exam #2 Ch 15

View Set

MLT ASCP Practice Questions 3.15.16

View Set