4B: Summarize Physical Attacks Flashcards

3.6 Given a scenario, perform a social engineering or physical attack.

1
Q

Natural barriers or fences to deter someone from simply entering the property.

A

Perimeter Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure entry system with two gateways, only one of which is open at any one time.

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.

A

RFID (Radio Frequency Identification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scanner that reads data from an RFID or NFC tag when in range.

A

Proximity Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies (based on RFID).

A

NFC (Near Field Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Copying authentication data from an RFID badge’s microchip to another badge, which can be done through handheld RFID writers, which are inexpensive and easy to use.

A

Badge Cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social engineering technique to gain access to a building by following someone who is unaware of their presence.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allowing a threat actor to enter a site or controlled location without authorization.

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly