Deck 4: The Role of People in Security
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
العب
ملء الشاشة (f)
Deck 4: The Role of People in Security
1
Hoaxes,while a potential nuisance,can not cause any real harm to your data.
False
2
Which of the following is NOT an example of a poor security practice?
A)The user does not follow established security policies or processes.
B)A result of a lack of security policies,procedures or training within the user's organization.
C)An employee does not allow a person he is talking to,to enter a secured area behind him before showing proper credentials.
D)An employee creates on good password and then uses it for all accounts.
A)The user does not follow established security policies or processes.
B)A result of a lack of security policies,procedures or training within the user's organization.
C)An employee does not allow a person he is talking to,to enter a secured area behind him before showing proper credentials.
D)An employee creates on good password and then uses it for all accounts.
C
3
An attacker watches people as they enter a building requiring a key card.He waits until he see someone who appears to be in a rush and has their hands full.He then intercepts the person,makes quick small talk,offers to help them hold what's in their hands while he swipes in,and follows behind.This is an example of
A)Spear phishing
B)Pharming
C)Piggybacking
D)Man trapping
A)Spear phishing
B)Pharming
C)Piggybacking
D)Man trapping
C
4
When creating a password,users tend to use
A)All capital letters
B)Passwords that are too long
C)Names of family,pets,or teams
D)Numbers only
A)All capital letters
B)Passwords that are too long
C)Names of family,pets,or teams
D)Numbers only
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
What are the security risks of installing games on an organization's system?
A)There are no significant risks.
B)Users can't always be sure where the software came from and it may have hidden software inside of it.
C)The users may play during work hours instead of during breaks.
D)The games may take up too much memory on the computer and slow down processing making it difficult to work.
A)There are no significant risks.
B)Users can't always be sure where the software came from and it may have hidden software inside of it.
C)The users may play during work hours instead of during breaks.
D)The games may take up too much memory on the computer and slow down processing making it difficult to work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
Installing unauthorized hardware such as a communication software and modem
A)Is a common practice and does not affect the organization
B)May cause a security breach and allow an intruder to have access to an organization's system by opening up a backdoor
C)Boosts the system so downloading from the Internet will be faster
D)Saves the company from buying a license by using other software
A)Is a common practice and does not affect the organization
B)May cause a security breach and allow an intruder to have access to an organization's system by opening up a backdoor
C)Boosts the system so downloading from the Internet will be faster
D)Saves the company from buying a license by using other software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is a good first step for companies to take to fight potential social engineering attacks?
A)Buy the latest virus protection software and install on the systems
B)Establish policies and procedures dictating the roles and responsibilities all users,as well as security administrators
C)Monitor all phone calls
D)Conduct background checks on all contractors,consultants,delivery persons,and partners that may have access to the facilities
A)Buy the latest virus protection software and install on the systems
B)Establish policies and procedures dictating the roles and responsibilities all users,as well as security administrators
C)Monitor all phone calls
D)Conduct background checks on all contractors,consultants,delivery persons,and partners that may have access to the facilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
Spear phishing is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
Attackers need a certain amount of information before launching their attack.One common place to find information is to go through the trash of the target to find information that could be useful to the attacker.This process of going through a target's trash is known in the community as
A)Trash rummaging
B)Garbage surfing
C)Piggy diving
D)Dumpster diving
A)Trash rummaging
B)Garbage surfing
C)Piggy diving
D)Dumpster diving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Social engineers attempt to convince authorized individuals to provide confidential information or access to an unauthorized individual.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
All of the following are characteristics of a strong password EXCEPT:
A)Contains numbers and letters
B)Contains at least eight characters
C)Contains an uncommon dictionary word
D)Contains special characters,i.e. ,*%$#@
A)Contains numbers and letters
B)Contains at least eight characters
C)Contains an uncommon dictionary word
D)Contains special characters,i.e. ,*%$#@
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
When an attacker attempts to get credit card numbers using telephone and voice technologies,it's called
A)Vishing
B)Telephishing
C)Phreaking
D)Voicing
A)Vishing
B)Telephishing
C)Phreaking
D)Voicing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
The only means of social engineering is through direct contact between the target and the attacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is the weakest password?
A)I@w3us1@!
B)P@ $$w0rd
C)C#as%t*1ng
D)H#e31L9pM3 Even though the password has eight characters,uppercase,lowercase,and special characters,it spells a common word and may be one of the words in a password cracking dictionary.
A)I@w3us1@!
B)P@ $$w0rd
C)C#as%t*1ng
D)H#e31L9pM3 Even though the password has eight characters,uppercase,lowercase,and special characters,it spells a common word and may be one of the words in a password cracking dictionary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Phishing is the most common form of social engineering attack related to computer security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following are techniques used by a social engineer EXCEPT:
A)An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.
B)An attacker calls up the IT department posing as an employee and requests a password reset.
C)An attacker runs a brute force attack on a password.
D)An attacker sends a forged e-mail with a link to a bogus web site that has been set to obtain personal information.
A)An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.
B)An attacker calls up the IT department posing as an employee and requests a password reset.
C)An attacker runs a brute force attack on a password.
D)An attacker sends a forged e-mail with a link to a bogus web site that has been set to obtain personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
Users on your network receive an e-mail warning them of a dangerous computer virus.It instructs the user to delete files it claims were put there by the virus,but they are actually critical system files.This is an example of
A)Social engineering
B)Reverse social engineering
C)A hoax
D)Phishing
A)Social engineering
B)Reverse social engineering
C)A hoax
D)Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
A person parks his car by an ATM,sets up a small camera discreetly pointed at ATM keypad,and then pretends to be going through bank papers in his car.This would be an example of
A)Piggybacking
B)Shoulder surfing
C)Phishing
D)Social engineering
A)Piggybacking
B)Shoulder surfing
C)Phishing
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
When and attacker tries to convince the target to initiate contact and then gets the target to give up confidential information,this is known as
A)Social engineering
B)Reverse social engineering
C)Piggybacking
D)Flim flam
A)Social engineering
B)Reverse social engineering
C)Piggybacking
D)Flim flam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
Social engineers attempt to exploit the natural tendencies of people.They do this by
A)First trying to evoke sympathy;if this fails,then by fear of confrontation
B)First trying to evoke fear of confrontation and then by sympathy
C)First trying to guess passwords and then use a password cracker
D)First trying to evoke passion and then fear
A)First trying to evoke sympathy;if this fails,then by fear of confrontation
B)First trying to evoke fear of confrontation and then by sympathy
C)First trying to guess passwords and then use a password cracker
D)First trying to evoke passion and then fear
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
The process of convincing an authorized individual to provide confidential information or access to an unauthorized individual is known as _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
_______________ is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
A good security practice is to choose one good password and use it for all of your various accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n)_______________ is an avenue that can be used to access a system while circumventing normal security mechanisms,and can often be used to install additional executable files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
Give an example of a hoax and how it might actually be destructive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Your boss saw a TV show that mentioned the term "social engineering." He wants to know what it is and how it might be used against the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
_______________ is the simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
One of the most effective tools for foiling the efforts of a social engineering attack is an active security awareness program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Write a password policy that your company will have to follow to ensure strong passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
The process of going through a target's trash in hopes of finding valuable information that might be used in a penetration attempt is known as _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
_______________ is when an e-mail trying to get sensitive information is sent to a group that has something in common,making the attack seem more personal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be.Create a bulleted list of those responsibilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
An attacker posts a flier offering services to clean computers of a virus that is sweeping the Internet,speeding them up as a result.A person concerned that he may have the virus because his computer was running slow,calls the attacker,asking for help.This is an example of ___________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
Shoulder surfing is when a person looks over the shoulder of another person while typing pins or passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Leaving sensitive information in a car is appropriate if the doors are locked and the files are not in plain view.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
When an attacker attempts to get sensitive information from a target using voice communication technology,it is called _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are the dangers of non-employees having physical access? Give examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
Dumpster diving is when a hacker gains access to a computer and tries to recover files from the recycle bin in the hopes of finding privileged information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
_______________ is a type of social engineering in which the attacker attempts to obtain sensitive information from a user by masquerading as a trusted entity in an e-mail or instant message sent to a large group of (often)random users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
When an attacker tries to position himself behind a user so that he can see what keys are being typed or what information is on the screen is called _______________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck

