Chapter 10 Flashcards

1
Q

What kind of social engineering is setting off a fire alarm?

A

Hoax

359

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whaling

A

Phishing / Spear Phishing

Identifies and targets one person in a phishing message
360

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

Phishing with VoIP

VoIP calls can be untraceable. Using phishing in combination for social engineering purposes can be a deadly combination
360

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The only real method for preventing social engineering

A

Training! Educate people not to fall for it

356-362

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Forms of social engineering

A
Shoulder Surfing
Dumpster Diving
Tailgating
Impersonation
Hoaxes
Whaling
Vishing
356-360
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Principles behind social engineering

A
Authority
Intimidation
Consensus/ Social Proof 
Scarcity
Urgency
Familiarity
Trust
362-363
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Minimum amount of barriers

A

Three:
External Entrance
Locked Doors protecting the computer center
Entrance to the computer room itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Proximity Reader

A

any ID or card reader capable of reading capable of reading proximity cards

The readers work with 13.56 MHz smart cards and 125 kHz proximity cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cable Lock

A

a physical lock that prevents someone from picking it up and walking away with a copy of the computer database
369

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are those hooks for on the back of a desktop computer?

A

So you can add a padlock to keep troublemakers from accessing the motherboard
369-370

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Camera Vs Guard

A

Camera is always running and can provide evidence in the event of a theft
Guard can be proactive and use critical thinking to prevent theft and gather evidence while it is fresh
372

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

First line of defense

A

Perimeter security. True whether physical or technological

372

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access List

A

Similar to an ACL, but in the real world

A list of people who have physical access to an area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lighting and Security

A

It can scare away intruders
Cannot apply facial recognition without it
374

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PDS

A

Protected Distribution System

Where the network is secure enough to allow for the transmission of classified information in unencrypted format
376

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Zone

A

Where access is individually monitored and controlled.

376

17
Q

Motion Detection

A

system can monitor a location and signal an alarm if it picks up movement. Can use infrared, microwave, and/or sonic sensors
376

18
Q

Fire Extinguisher Ratings. What are they for?

A
A. Wood and Paper 
B. Flammable Liquids
C. Electrical
D. Flammable Metals
378
19
Q

Fire Extinguisher Ratings. What do they use?

A
A. Largely Water / Chemical 
B. Fire-Retardant chemicals
C. Nonconductive chemicals
D. varies
378
20
Q

PASS method

A

procedure for using a fire extinguisher

Pull
Aim
Squeeze
Sweep
379
21
Q

Fixed Systems

A

Fire Detectors and Fire Suppressant system

If the sprinklers detect smoke, they spray water/fire suppressant gas
379

22
Q

Major concern with electrical fires

A

They’re usually still plugged in. Hazard can recur

379

23
Q

Drawbacks of gas based systems

A

Require sealed environments
Expensive
Displaces oxygen in the room… suffocation
380

24
Q

Perks of gas based systems

A

Does not damage computer systems

380

25
Q

Faraday Cage

A

can provide electrical shielding surrounding a computer room. To prevent outside communication
380

26
Q

Desensitizing

A

If RF levels are too high, it can cause wireless units to become deaf even if the signals are on different frequencies.
381

27
Q

Hot and Cold Aisles

A

Providing constant circulation in a server room by alternating the tempurture of the aisles
382