Deck 4: The Role of People in Security

ملء الشاشة (f)
exit full mode
سؤال
Hoaxes,while a potential nuisance,can not cause any real harm to your data.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is NOT an example of a poor security practice?

A)The user does not follow established security policies or processes.
B)A result of a lack of security policies,procedures or training within the user's organization.
C)An employee does not allow a person he is talking to,to enter a secured area behind him before showing proper credentials.
D)An employee creates on good password and then uses it for all accounts.
سؤال
An attacker watches people as they enter a building requiring a key card.He waits until he see someone who appears to be in a rush and has their hands full.He then intercepts the person,makes quick small talk,offers to help them hold what's in their hands while he swipes in,and follows behind.This is an example of

A)Spear phishing
B)Pharming
C)Piggybacking
D)Man trapping
سؤال
When creating a password,users tend to use

A)All capital letters
B)Passwords that are too long
C)Names of family,pets,or teams
D)Numbers only
سؤال
What are the security risks of installing games on an organization's system?

A)There are no significant risks.
B)Users can't always be sure where the software came from and it may have hidden software inside of it.
C)The users may play during work hours instead of during breaks.
D)The games may take up too much memory on the computer and slow down processing making it difficult to work.
سؤال
Installing unauthorized hardware such as a communication software and modem

A)Is a common practice and does not affect the organization
B)May cause a security breach and allow an intruder to have access to an organization's system by opening up a backdoor
C)Boosts the system so downloading from the Internet will be faster
D)Saves the company from buying a license by using other software
سؤال
What is a good first step for companies to take to fight potential social engineering attacks?

A)Buy the latest virus protection software and install on the systems
B)Establish policies and procedures dictating the roles and responsibilities all users,as well as security administrators
C)Monitor all phone calls
D)Conduct background checks on all contractors,consultants,delivery persons,and partners that may have access to the facilities
سؤال
Spear phishing is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
سؤال
Attackers need a certain amount of information before launching their attack.One common place to find information is to go through the trash of the target to find information that could be useful to the attacker.This process of going through a target's trash is known in the community as

A)Trash rummaging
B)Garbage surfing
C)Piggy diving
D)Dumpster diving
سؤال
Social engineers attempt to convince authorized individuals to provide confidential information or access to an unauthorized individual.
سؤال
All of the following are characteristics of a strong password EXCEPT:

A)Contains numbers and letters
B)Contains at least eight characters
C)Contains an uncommon dictionary word
D)Contains special characters,i.e. ,*%$#@
سؤال
When an attacker attempts to get credit card numbers using telephone and voice technologies,it's called

A)Vishing
B)Telephishing
C)Phreaking
D)Voicing
سؤال
The only means of social engineering is through direct contact between the target and the attacker.
سؤال
Which of the following is the weakest password?

A)I@w3us1@!
B)P@ $$w0rd
C)C#as%t*1ng
D)H#e31L9pM3 Even though the password has eight characters,uppercase,lowercase,and special characters,it spells a common word and may be one of the words in a password cracking dictionary.
سؤال
Phishing is the most common form of social engineering attack related to computer security.
سؤال
All of the following are techniques used by a social engineer EXCEPT:

A)An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.
B)An attacker calls up the IT department posing as an employee and requests a password reset.
C)An attacker runs a brute force attack on a password.
D)An attacker sends a forged e-mail with a link to a bogus web site that has been set to obtain personal information.
سؤال
Users on your network receive an e-mail warning them of a dangerous computer virus.It instructs the user to delete files it claims were put there by the virus,but they are actually critical system files.This is an example of

A)Social engineering
B)Reverse social engineering
C)A hoax
D)Phishing
سؤال
A person parks his car by an ATM,sets up a small camera discreetly pointed at ATM keypad,and then pretends to be going through bank papers in his car.This would be an example of

A)Piggybacking
B)Shoulder surfing
C)Phishing
D)Social engineering
سؤال
When and attacker tries to convince the target to initiate contact and then gets the target to give up confidential information,this is known as

A)Social engineering
B)Reverse social engineering
C)Piggybacking
D)Flim flam
سؤال
Social engineers attempt to exploit the natural tendencies of people.They do this by

A)First trying to evoke sympathy;if this fails,then by fear of confrontation
B)First trying to evoke fear of confrontation and then by sympathy
C)First trying to guess passwords and then use a password cracker
D)First trying to evoke passion and then fear
سؤال
The process of convincing an authorized individual to provide confidential information or access to an unauthorized individual is known as _______________.
سؤال
_______________ is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
سؤال
A good security practice is to choose one good password and use it for all of your various accounts.
سؤال
A(n)_______________ is an avenue that can be used to access a system while circumventing normal security mechanisms,and can often be used to install additional executable files.
سؤال
Give an example of a hoax and how it might actually be destructive.
سؤال
Your boss saw a TV show that mentioned the term "social engineering." He wants to know what it is and how it might be used against the company.
سؤال
_______________ is the simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.
سؤال
One of the most effective tools for foiling the efforts of a social engineering attack is an active security awareness program.
سؤال
Write a password policy that your company will have to follow to ensure strong passwords.
سؤال
The process of going through a target's trash in hopes of finding valuable information that might be used in a penetration attempt is known as _______________.
سؤال
_______________ is when an e-mail trying to get sensitive information is sent to a group that has something in common,making the attack seem more personal.
سؤال
Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be.Create a bulleted list of those responsibilities.
سؤال
An attacker posts a flier offering services to clean computers of a virus that is sweeping the Internet,speeding them up as a result.A person concerned that he may have the virus because his computer was running slow,calls the attacker,asking for help.This is an example of ___________________.
سؤال
Shoulder surfing is when a person looks over the shoulder of another person while typing pins or passwords.
سؤال
Leaving sensitive information in a car is appropriate if the doors are locked and the files are not in plain view.
سؤال
When an attacker attempts to get sensitive information from a target using voice communication technology,it is called _______________.
سؤال
What are the dangers of non-employees having physical access? Give examples.
سؤال
Dumpster diving is when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.
سؤال
_______________ is a type of social engineering in which the attacker attempts to obtain sensitive information from a user by masquerading as a trusted entity in an e-mail or instant message sent to a large group of (often)random users.
سؤال
When an attacker tries to position himself behind a user so that he can see what keys are being typed or what information is on the screen is called _______________
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: The Role of People in Security
1
Hoaxes,while a potential nuisance,can not cause any real harm to your data.
False
2
Which of the following is NOT an example of a poor security practice?

A)The user does not follow established security policies or processes.
B)A result of a lack of security policies,procedures or training within the user's organization.
C)An employee does not allow a person he is talking to,to enter a secured area behind him before showing proper credentials.
D)An employee creates on good password and then uses it for all accounts.
C
3
An attacker watches people as they enter a building requiring a key card.He waits until he see someone who appears to be in a rush and has their hands full.He then intercepts the person,makes quick small talk,offers to help them hold what's in their hands while he swipes in,and follows behind.This is an example of

A)Spear phishing
B)Pharming
C)Piggybacking
D)Man trapping
C
4
When creating a password,users tend to use

A)All capital letters
B)Passwords that are too long
C)Names of family,pets,or teams
D)Numbers only
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
What are the security risks of installing games on an organization's system?

A)There are no significant risks.
B)Users can't always be sure where the software came from and it may have hidden software inside of it.
C)The users may play during work hours instead of during breaks.
D)The games may take up too much memory on the computer and slow down processing making it difficult to work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
Installing unauthorized hardware such as a communication software and modem

A)Is a common practice and does not affect the organization
B)May cause a security breach and allow an intruder to have access to an organization's system by opening up a backdoor
C)Boosts the system so downloading from the Internet will be faster
D)Saves the company from buying a license by using other software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is a good first step for companies to take to fight potential social engineering attacks?

A)Buy the latest virus protection software and install on the systems
B)Establish policies and procedures dictating the roles and responsibilities all users,as well as security administrators
C)Monitor all phone calls
D)Conduct background checks on all contractors,consultants,delivery persons,and partners that may have access to the facilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
Spear phishing is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
Attackers need a certain amount of information before launching their attack.One common place to find information is to go through the trash of the target to find information that could be useful to the attacker.This process of going through a target's trash is known in the community as

A)Trash rummaging
B)Garbage surfing
C)Piggy diving
D)Dumpster diving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Social engineers attempt to convince authorized individuals to provide confidential information or access to an unauthorized individual.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
All of the following are characteristics of a strong password EXCEPT:

A)Contains numbers and letters
B)Contains at least eight characters
C)Contains an uncommon dictionary word
D)Contains special characters,i.e. ,*%$#@
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
When an attacker attempts to get credit card numbers using telephone and voice technologies,it's called

A)Vishing
B)Telephishing
C)Phreaking
D)Voicing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
The only means of social engineering is through direct contact between the target and the attacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is the weakest password?

A)I@w3us1@!
B)P@ $$w0rd
C)C#as%t*1ng
D)H#e31L9pM3 Even though the password has eight characters,uppercase,lowercase,and special characters,it spells a common word and may be one of the words in a password cracking dictionary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Phishing is the most common form of social engineering attack related to computer security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following are techniques used by a social engineer EXCEPT:

A)An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.
B)An attacker calls up the IT department posing as an employee and requests a password reset.
C)An attacker runs a brute force attack on a password.
D)An attacker sends a forged e-mail with a link to a bogus web site that has been set to obtain personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
Users on your network receive an e-mail warning them of a dangerous computer virus.It instructs the user to delete files it claims were put there by the virus,but they are actually critical system files.This is an example of

A)Social engineering
B)Reverse social engineering
C)A hoax
D)Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
A person parks his car by an ATM,sets up a small camera discreetly pointed at ATM keypad,and then pretends to be going through bank papers in his car.This would be an example of

A)Piggybacking
B)Shoulder surfing
C)Phishing
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
When and attacker tries to convince the target to initiate contact and then gets the target to give up confidential information,this is known as

A)Social engineering
B)Reverse social engineering
C)Piggybacking
D)Flim flam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
Social engineers attempt to exploit the natural tendencies of people.They do this by

A)First trying to evoke sympathy;if this fails,then by fear of confrontation
B)First trying to evoke fear of confrontation and then by sympathy
C)First trying to guess passwords and then use a password cracker
D)First trying to evoke passion and then fear
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
The process of convincing an authorized individual to provide confidential information or access to an unauthorized individual is known as _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
_______________ is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
A good security practice is to choose one good password and use it for all of your various accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n)_______________ is an avenue that can be used to access a system while circumventing normal security mechanisms,and can often be used to install additional executable files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
Give an example of a hoax and how it might actually be destructive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Your boss saw a TV show that mentioned the term "social engineering." He wants to know what it is and how it might be used against the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
_______________ is the simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
One of the most effective tools for foiling the efforts of a social engineering attack is an active security awareness program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Write a password policy that your company will have to follow to ensure strong passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
The process of going through a target's trash in hopes of finding valuable information that might be used in a penetration attempt is known as _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
_______________ is when an e-mail trying to get sensitive information is sent to a group that has something in common,making the attack seem more personal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be.Create a bulleted list of those responsibilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
An attacker posts a flier offering services to clean computers of a virus that is sweeping the Internet,speeding them up as a result.A person concerned that he may have the virus because his computer was running slow,calls the attacker,asking for help.This is an example of ___________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
Shoulder surfing is when a person looks over the shoulder of another person while typing pins or passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Leaving sensitive information in a car is appropriate if the doors are locked and the files are not in plain view.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
When an attacker attempts to get sensitive information from a target using voice communication technology,it is called _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are the dangers of non-employees having physical access? Give examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
Dumpster diving is when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
_______________ is a type of social engineering in which the attacker attempts to obtain sensitive information from a user by masquerading as a trusted entity in an e-mail or instant message sent to a large group of (often)random users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
When an attacker tries to position himself behind a user so that he can see what keys are being typed or what information is on the screen is called _______________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.