lab 33 Flashcards

(5 cards)

1
Q

What is the best defense against social engineering attacks

Ingress firewall rules
Multifactor authentication
Detailed auditing
Training and attack demonstrations/walkthroughs

A

Training and attack demonstrations/walkthroughs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A social engineering attack is often long and complex. They usually involve dozens of interactions between the attacker and the victim.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What technical defense would be a means to prevent the social engineering attack of this lab from being successful? (Select two)

Strict egress firewall rules
Blocking the execution of all unknown code
Using a VPN
Require a biometric factor during authentication
Limiting sessions to 6 hours or less

A

Strict egress firewall rules
Blocking the execution of all unknown code
Using a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of training enhances users’ ability to recognize and respond to potential security threats or suspicious activities, emphasizes the importance of being vigilant, observing surroundings, and promptly reporting any unusual or problematic incidents that may pose a security risk?

Situational Awareness
Insider Threat
Operational Security
Hybrid/Remote Work Environments

A

Situational Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social engineering attacks originate only from outside the organization.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly