Cyberfraud Flashcards
(37 cards)
Pharming is a type of attack in which users are fooled into entering sensitive data into a malicious website that imitates a legitimate website.
A. True
B. False
True
Matthew receives a voice mail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Of which of the following types of schemes has Matthew become the target?
A. Pharming
B. Vishing
C. Smishing
D. Spear phishing
B. Vishing
Which of the following is a technical security control that involves application-level controls implemented to prevent data from being accessed, stolen, modified, or deleted by unauthorized users?
A. Multifactor authentication
B. Data classification
C. Application security
D. Network security
C. Application security
Vishing is a type of phishing scheme that uses text messages or other short message systems to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity.
A. True
B. False
False
Which of the following is an administrative security control that an organization’s management can implement?
A. Creating an incident response plan
B. Issuing smart access cards to employees
C. Installing a firewall for the network
D. Backing up system files regularly
A. Creating an incident response plan
Which of the following activities does NOT typically occur during the containment and eradication step of the recommended methodology for responding to cybersecurity incidents?
A. Limiting the damage caused by the attack
B. Restoring control of the affected systems
C. Identifying all breaches that occurred
D. Notifying the appropriate internal personnel
C. Identifying all breaches that occurred
Which of the following is the MOST ACCURATE definition of a Trojan horse?
A. A program or command procedure that appears useful but contains hidden code that causes damage
B. A software program that contains various instructions that are executed every time a computer is turned on
C. A virus that changes its structure to avoid detection
D. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
A. A program or command procedure that appears useful but contains hidden code that causes damage
All the following are best practices for ensuring separation of duties within the information systems department and between IT and business unit personnel EXCEPT:
A. End users should not have access to production data outside the scope of their normal job duties.
B. Program developers should not be responsible for testing programs.
C. IT departments should not overlap with information user departments.
D. Only programmers should be server administrators.
D. Only programmers should be server administrators.
Which of the following is the MOST ACCURATE definition of spyware?
A. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
B. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers
C. A program or command procedure that appears useful but contains hidden code that causes damage
D. Any software application that displays advertisements while it is operating
A. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
A data classification policy can BEST be described as a(n):
A. Technical security control
B. Physical security control
C. Application security control
D. Administrative security control
D. Administrative security control
Which of the following BEST describes phishing?
A. A method for acquiring sensitive information needed to facilitate a specific scheme by searching through large quantities of available data
B. A method for acquiring sensitive information in which an attacker hides near the target to gain unauthorized access to a computer system
C. A method for acquiring sensitive information by bypassing a computer system’s security using an undocumented operating system and network functions
D. A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business
D. A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business
Which of the following types of malware can be used to generate illicit income in the form of cryptocurrency while slowing an infected computer and causing victims to incur costs related to power usage or cloud storage?
A. Spyware
B. Coin miners
C. Overwrite viruses
D. Keyloggers
B. Coin miners
Which of the following BEST describes social engineering?
A. A method for gaining unauthorized access to a computer system in which an attacker hides near the target to obtain sensitive information that they can use to facilitate their intended scheme
B. A method for gaining unauthorized access to a computer system in which an attacker bypasses a system’s security using an undocumented operating system and network functions
C. A method for gaining unauthorized access to a computer system in which an attacker searches through large quantities of available data to find sensitive information that they can use to facilitate their intended scheme
D. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme
D. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme
Which of the following refers to the type of network security systems that are designed to supplement firewalls and other forms of network security by detecting malicious activity coming across the network or on a host?
A. Intrusion detection systems
B. Intrusion admission systems
C. Network access controls
D. Network address prevention systems
A. Intrusion detection systems
Which of the following is a type of physical access control device that can be used to control access to physical objects?
A. Locks and keys
B. Electronic access cards
C. Biometric systems
D. All of the above
D. All of the above
To ensure separation of duties within the information systems department and between IT and business unit personnel, computer operators should be responsible for performing computer programming.
A. True
B. False
False
Logical access controls, encryption, and application security are all technical security controls used to safeguard computer systems and communication networks.
A. True
B. False
True
Which of the following objectives MOST ACCURATELY describes administrative security controls?
A. Ensuring that all personnel who have access to computing resources have the required authorizations and appropriate security clearances
B. Providing connectivity with acceptable response times, user-friendly access, and a secure mode at an acceptable cost to the organization
C. Keeping unauthorized personnel from entering physical facilities and warning personnel when physical security measures are being violated
D. Fully securing all organizational systems and data without considering budget implications
A. Ensuring that all personnel who have access to computing resources have the required authorizations and appropriate security clearances
An incident response plan should be created and implemented during the breach notification step of the recommended methodology for responding to cybersecurity incidents.
A. True
B. False
False
The primary purpose of physical access controls is to prevent unauthorized access to computer software.
A. True
B. False
False
After paying the ransom demanded by the fraudster, a ransomware victim is always granted access to all locked files on the compromised computer.
A. True
B. False
False
Which of the following is NOT an indicator that a computer or network might have been accessed or compromised by an unauthorized user or entity?
A. Users receive a notification to update their system passwords before they expire.
B. A user in the IT department detects geographical irregularities in network traffic.
C. Users are prompted to install unusual software or patches onto their computers.
D. An authorized user is denied access to an area in the network that is part of their role.
A. Users receive a notification to update their system passwords before they expire.
Which of the following is the MOST ACCURATE definition of a computer worm?
A. A program or command procedure that appears useful but contains hidden code that causes damage
B. A type of software that, while not definitely malicious, has a suspicious or potentially unwanted aspect to it
C. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers
D. Any software application that displays advertisements while it is operating
C. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers CORR
is the technical security control involving deliberate scrambling of a message so that it is unreadable except to those who hold the key for unscrambling the message.
A. Alteration of input
B. Firewall security
C. Encryption
D. Customer validation
C. Encryption