Social Engineering & Malware Flashcards

1
Q

Which Kali Linux command is used to clone a site in an attempt to harvest user credentials?

  • chmod
  • hydra
  • setoolkit
  • nc
A

setoolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of DNS record query should always be considered to be suspicious?

  • A
  • AAA
  • TXT
  • PTR
A

TXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of malware appears benign but in fact is not?

  • Trojan
  • Ransomware
  • Virus
  • Worm
A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which details can indicate that an email message is a phishing attempt?

  • Bad grammar
  • Company logos
  • Abnormal email addresses
  • Date and time stamps
A

Bad grammar
Abnormal email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As a help desk technician, you are attempting to install a new corporate-sanctioned app on a user station, but the virus scanner prevents the installation from completing. What should you do?

  • Do not install the app
  • Disable real-time virus threat protection
  • Uninstall the virus protection and install the app
  • Determine the folder the app installer is writing to and add it as an exclusion
A

Determine the folder the app installer is writing to and add it as an exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of attack attempts to trick users with what appears to be a legitimate email message?

  • APT
  • Phishing
  • Ransomware
  • Reverse shell
A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly