lab 33 Flashcards
(5 cards)
What is the best defense against social engineering attacks
Ingress firewall rules
Multifactor authentication
Detailed auditing
Training and attack demonstrations/walkthroughs
Training and attack demonstrations/walkthroughs
A social engineering attack is often long and complex. They usually involve dozens of interactions between the attacker and the victim.
True
False
False
What technical defense would be a means to prevent the social engineering attack of this lab from being successful? (Select two)
Strict egress firewall rules
Blocking the execution of all unknown code
Using a VPN
Require a biometric factor during authentication
Limiting sessions to 6 hours or less
Strict egress firewall rules
Blocking the execution of all unknown code
Using a VPN
What type of training enhances users’ ability to recognize and respond to potential security threats or suspicious activities, emphasizes the importance of being vigilant, observing surroundings, and promptly reporting any unusual or problematic incidents that may pose a security risk?
Situational Awareness
Insider Threat
Operational Security
Hybrid/Remote Work Environments
Situational Awareness
Social engineering attacks originate only from outside the organization.
True
False
False