*Chapter 04 Quiz (ITN260) - The Role of People in Security

studied byStudied by 17 people
5.0(2)
Get a hint
Hint

Which statement describes how reverse social engineering is accomplished?

1 / 24

flashcard set

Earn XP

Description and Tags

25 Terms

1

Which statement describes how reverse social engineering is accomplished?

An attacker tries to convince the target to initiate contact and then gets the target to give up confidential information.

New cards
2

Which statement describes why social engineering is successful?

People have a basic desire to be helpful.

New cards
3

Which statement describes an example of a poor security practice?

An employee creates a strong password and then uses it for all accounts.

New cards
4

A user receives an e-mail warning of a dangerous computer virus and instructing the user to delete files it claims were put there by the virus. However, the files are actually critical system files. Which term describes this scenario?

A hoax

New cards
5

Which statement best explains why vishing is successful?

Vishing is successful because of the trust that individuals place in the telephone system.

New cards
6

Phishing is the most common form of social engineering attack related to computer security. (T/F)

True

New cards
7

Time can be manipulated to drive a sense of ________ and prompt shortcuts that can lead to opportunities for interjection into processes.

urgency

New cards
8

Impersonation can be employed in online attacks. (T/F)

True

New cards
9

An implied future change in availability can create a perception of scarcity. (T/F)

True

New cards
10

Which statement identifies the best defense to prevent information from being obtained in a shoulder surfing attack?

Users should be aware of their surroundings and not allow individuals to get into a position from which they can observe what the user is entering.

New cards
11

Voice communication caller ID systems can be spoofed. (T/F)

True

New cards
12

Which term describes a type of phishing where individuals who are high up in an organization such as the corporate officers are targeted?

whaling

New cards
13

A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target of the attack to do something they normally wouldn't do. (T/F)

True

New cards
14

Suppose that an attacker attempts to get credit card numbers using telephone and voice communication technologies. What term is used for this type of attack?

vishing

New cards
15

Which poor security practice is one of the most common and most dangerous?

choosing poor passwords

New cards
16

The tools in a social engineer's toolbox are based on a sophisticated knowledge of software and hardware. (T/F)

False

New cards
17

Which statement describes how shoulder surfing is accomplished?

An attacker directly observes the target entering sensitive information on a form, keypad, or keyboard.

New cards
18

The insider may be much more successful in carrying out a social engineering attack. (T/F)

True

New cards
19

The only means of social engineering is through direct contact between the target and the attacker. (T/F)

False

New cards
20

Which of the following devices is a sophisticated countermeasure to piggybacking?

a man trap

New cards
21

Which term describes an attack that changes URLs in a server's domain name table?

DNS poisoning

New cards
22

Which statement describes how piggybacking is accomplished?

An attacker follows closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.

New cards
23

Which statement accurately describes how pharming is accomplished?

The attacker modifies local host files, which are used to convert URLs to the appropriate IP address, so that the user is directed to a fake website.

New cards
24

Reverse social engineering is easier to execute than social engineering. (T/F)

False

New cards
25

Which statement describes how dumpster diving is accomplished?

An attacker attempts to find little bits of information that could be useful for an attack in a target's trash can.

New cards

Explore top notes

note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 24 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 92 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 47 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 4 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 32834 people
Updated ... ago
4.8 Stars(97)

Explore top flashcards

flashcards Flashcard201 terms
studied byStudied by 711 people
Updated ... ago
4.0 Stars(3)
flashcards Flashcard20 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 32 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard55 terms
studied byStudied by 3 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard94 terms
studied byStudied by 52 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard61 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard25 terms
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard145 terms
studied byStudied by 49 people
Updated ... ago
5.0 Stars(2)