Social Engineering and Other Foes (Ch. 10) Flashcards

(36 cards)

1
Q

A control implemented through administrative policies or procedures.

A

administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A physical security deterrent used to protect a computer.

A

cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server room aisles that blow cold air from the floor or aisles in which the fronts of the devices face the AC ouput

A

cold aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gap controls that fill in the coverage between other types of vulnerability mitigation techniques.

A

compensating controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Processes or actions used to respond to situations or events.

A

control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technical, physical, or administrative measures in place to assist with resource management.

A

control types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Getting rid of/destroying media no longer needed.

A

data disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Controls that are intended to identify and characterize an incident in progress (for example, sounding the alarm and alerting the administrator).

A

detective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Looking through trash for clues often in the form of paper scraps to find users passwords and other pertinent information.

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An electrically conductive wire mesh or other conductor woven into a cage that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls.

A

Faraday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The act of stopping a fire and preventing it from spreading.

A

fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typically, an email message warning of something that isn’t true, such as an outbreak of a new virus. A hoax can send users into a panic and cause more harm than the virus.

A

hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A server room aisle in which the hot air exhaust of devices face the warm air return of an AC

A

hot aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pretending to be another person to gain information.

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of determining what information is accessible, to what parties, and for what purposes.

A

information classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A device, such as a small room, that limits access to one or a few individuals.

17
Q

The correct method of extinguishing a fire with an extinguisher: Pull, Aim, Squeeze, and Sweep.

18
Q

Security set up on the outside of the network or server to protect it.

A

perimeter security

19
Q

ard required of federal employees and contractors to gain access (physical and logical) to government resources.

A

Personal Identity Verification (PIV) C

20
Q

Information that can be uniquely used to identify, contact, or locate a single person. Examples include Social Security number, driver’s license number, fingerprints, and handwriting.

A

personally identifiable information (PII)

21
Q

A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.

22
Q

ontrols and countermeasures of a tangible nature intended to minimize intrusions.

A

physical controls C

23
Q

Controls intended to prevent attacks or intrusions.

A

preventive controls

24
Q

A state of security in which information isn’t seen by unauthorized parties without the express permission of the party involved.

25
Screens that restrict viewing of monitors to only those sitting in front of them.
privacy filters
26
Cameras that can pan, tilt, and zoom.
PTZ
27
Information that isn't made available to all and to which access is granted based on some criteria.
restricted information
28
Watching someone when they enter their username, password, or sensitive data.
shoulder surfing
29
An attack that uses others by deceiving them. It does not directly target hardware or software, but instead it targets and manipulates people.
social engineering
30
A form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.
spear phishing
31
Following someone through an entry point.
tailgating
32
Controls that rely on technology.
technical controls
33
Combining phishing with Voice over IP (VoIP).
vishing
34
Identifying a site that is visited by those that they are targeting, poisoning that site, and then waiting for the results.
watering hole attack
35
Another term for social engineering.
wetware
36
Targeting employees in an organization that would more likely lead to the divulgement of sensitive information. Typically managers, supervisors or high-level executives
whaling