FORMATIVE 4 Flashcards

(25 cards)

1
Q

What type of threat allows an attacker to obtain the credentials of a bank client by spoofing the login webpage of a financial institution?

piggybacking

vishing

whaling

malvertising

A

malvertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a watering hole attack?

an attack carried out in a phone conversation

an attack targeted at high-profile business executives and key individuals in a company

an attack that exploits a website that is commonly accessed by members of a targeted organization

an attack performed by an unauthorized person who tags along with an authorized person to gain entry to a restricted area

A

an attack that exploits a website that is commonly accessed by members of a targeted organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the act of gaining knowledge or information from a victim without directly asking for that particular information?

influence

elicitation

interrogation

impersonation

A

elicitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A threat actor has altered the host file for a commonly accessed website on the computer of a victim. Now when the user clicks on the website link, they are redirected to a malicious website. What type of attack has the threat actor accomplished?

phishing

vishing

pharming

tailgating

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why would a threat actor use the Social-Engineering Toolkit (SET)?

to send a spear phishing email

to spoof a phone number

to manipulate users by leveraging XSS vulnerabilities

to practice social engineering elicitation, interrogation, and pretexting skills

A

to send a spear phishing email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which option is a voice over IP management tool that can be used to impersonate caller ID?

SpoofCard

Asterisk

SpoofApp

Nikto

A

Asterisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A salesperson is attempting to convince a customer to buy a product because limited supplies are available. Which social engineering method of influence is being used by the salesperson?

social proof

authority

likeness

scarcity

A

scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What method of influence is characterized when a celebrity endorses a product on social media?

social proof

scarcity

authority

fear

A

social proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Apple is a company constantly working towards making its products and processes more environmentally friendly. Therefore, the Apple brand is associated with ideals and values that customers can relate to and support. What method of influence is being used by Apple?

fear

scarcity

authority

likeness

A

likeness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A threat actor has sent a phishing email to a victim stating that suspicious activity has been detected on their bank account and that they must immediately click on a provided link to change their password. What method of influence is being used by the threat actor?

social proof

authority

likeness

urgency

A

urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which social engineering physical attack statement is correct?

In the tailgating attack, an unauthorized person tags along with an authorized person to gain entry to a restricted area with the person’s consent.

In the piggybacking attack, an unauthorized person tags along with an authorized person to gain entry to a restricted area without the person’s consent.

Badge cloning attacks cannot be performed by software.

Shoulder surfing can be prevented by using special screen filters for computer displays.

A

Shoulder surfing can be prevented by using special screen filters for computer displays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which tool provides a threat actor a web console to manipulate users who are victims of cross-site scripting (XSS) attacks?

Asterisk

SET

BeEF

Nikto

A

BeEF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Apple iOS and Android tool can be used to spoof a phone number?

SpoofApp

Nessus

Asterisk

BeEF

A

SpoofApp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two physical attacks are mitigated by using access control vestibules? (Choose two.)

shoulder surfing

dumpster diving

tailgating

badge cloning

piggybacking

A

tailgating

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two access control options are commonly used in conjunction with access control vestibules? (Choose two.)

proximity card and PIN

turnstile

security guard

toll collector

biometric scan

A

proximity card and PIN

biometric scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which resource would mitigate piggybacking and tailgating?

security guard

camera

“no trespassing” warnings

badge/card access

A

security guard

17
Q

Which tool can launch social engineering attacks and be integrated with third-party tools and frameworks such as Metasploit?

BeEF

Nessus

SET

Asterisk

18
Q

Who is the target of a whaling attack?

upper managers such as the CEO or key individuals in an organization

ordinary users

user groups of social networks such as Facebook and Twitter

companies that use animals in product testing

A

upper managers such as the CEO or key individuals in an organization

19
Q

What is the purpose of a vishing attack?

to create emails and web pages to collect sensitive information from a user

to convince a victim on a phone call to disclose private or financial information

to use text messages to send malware or malicious links to mobile devices of users

to use USB sticks to compromise the systems of victims

A

to convince a victim on a phone call to disclose private or financial information

20
Q

Which Apple iOS and Android tools can spoof a phone number, record calls, and generate different background noises?

Nessus

Asterisk

SpoofCard

BeEF

21
Q

A threat actor has sent a text message to a victim stating that they have won bitcoins in a bank contest. To claim their prize, the victim must click the provided link and enter their bank account information. What social engineering attack can be accomplished if the user enters their banking information?

vishing

SMS phishing

whaling

watering hole

22
Q

Which tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell?

BeEF

SET

Nessus

Nikto

23
Q

Which tool can send fake notifications to the browser of a victim?

Nexpose

BeEF

Nikto

Asterisk

24
Q

A new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new employee unknowingly enabled?

watering hole

pivot

badge cloning

shoulder surfing

A

badge cloning

25
A user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive? throw the pen drive away deliver the pen drive to the security sector of the company plug the pen drive into a computer of the company, try to delete all the files, and use the pen drive for personal use plug the pen drive into a computer of the company, try to access the files to identify who the pen drive belongs to
deliver the pen drive to the security sector of the company