Chapter 10 - Social Engineering and Other Foes Flashcards Preview

CompTIA Security+ > Chapter 10 - Social Engineering and Other Foes > Flashcards

Flashcards in Chapter 10 - Social Engineering and Other Foes Deck (19):
1

What are the different types of Social Engineering Attacks?

page 356
- Shoulder Surfing
- Dumpster Diving
- Tailgating
- Impersonation
- Hoaxes

2

What are the Principles behind Social Engineering?

page 362
- Authority - Trust
- Intimidation - Scarcity
- Consensus/Social Proof - Urgency
- Familiarity/ Liking

3

At what frequency do the Proximity readers work at?

page 367
For smart cards = 13.56 MHz
For Proximity cards = 125 KHz

4

What is a man-trap?

page 371
A series of interconnecting interlocks in which one door must close before another is opened.

5

What is PDS?

page 376
Protected Distribution System
The network is secure enough to allow for the transmission of classified information in unencrypted format.

6

What is occasionally referred to as Wetware?

page 355
Social Engineering

7

What helps in decreasing shoulder surfing?

page 357
Privacy filters

8

What does CERT stand for?

page 359
Computer Emergency Readiness Team

9

What is Whaling?

page 360
Instead of sending out a "To Whom It May Concern" message, the whaler identifies one person from whom they can gain all the data they want, usually the manager or owner.

10

What is Vishing?

page 360
Combined with phishing and VoIP, is an elevated form of social engineering

11

What is the only preventive measure in dealing with Social Engineering?

page 365
Is to educate your users

12

What are a few things to deter intruders from breaking into your building?

page 373
Install improved door locks

13

What are the Fire Extinguisher ratings?

page 378
A - Wood and Paper
B - Flammable Liquids
C - Electrical
D - Flammable Metals

14

What are the most common Fixed Systems for Fire Suppression?

page 379
Combine Fire Detectors with Fire Suppression systems.

15

What is RF desensitization?

page 381
When RF levels become to high that it can cause receivers in wireless units to become deaf.

16

What is TEMPEST-compliant?

page 382
Means that a computer system doesn't emit any significant amount of EMI or RFI

17

What are the different Control Types?

page 384
Deterrent
Preventive
Detective
Compensating
Technical
Administrative

18

What are important administrative data policies to have in control?

page 385
Wiping - How is data removed from media?
Disposing - How are media are discarded when they are no longer needed.
Retention - How long must data be kept?
Storage - What is data kept and what security precaution are associated with its access?

19

What are the three steps in Destroying Flash Drive?

page 387
1. Crack Open the Drive
2. Turn the Chip to Powder
3. Finish it Off