Professional Documents
Culture Documents
4thquarter Review
4thquarter Review
Review
Multiple Choice
• THIS IS A CONSEQUENCE OF MAIL CLIENTS TRYING TO AUTOFILL AN ADDRESS FROM THE
CHARACTERS TYPED BY THE USER. ALWAYS CHECK IF THE RECIPIENT IS INDEED THE INTENDED
ONE.
A. Distribution list
B. conflict
C. misaddressing
D. Legal issues
• THIS IS A CONSEQUENCE OF MAIL CLIENTS TRYING TO AUTOFILL AN ADDRESS FROM THE
CHARACTERS TYPED BY THE USER. ALWAYS CHECK IF THE RECIPIENT IS INDEED THE INTENDED
ONE.
A. Distribution list
B. conflict
C. misaddressing
D. Legal issues
• THIS IS A TYPE OF MALWARE THAT CAN BE INSTALLED ON SYSTEMS VIA SOCIAL ENGINEERING,
UPON EXECUTION OF MALWARE, OR SIMPLY BY BROWSING A MALICIOUS WEBSITE. ONCE
INSTALLED, AN ATTACKER CAN PERFORM VIRTUALLY ANY FUNCTION ON THE SYSTEM INCLUDING
REMOTE ACCESS, HIDE PROCESSES, AND DUPLICATE AND DELETE FILES.
A. Ransomware
B. Bot
C. Fork bomb
D. Rootkit
• THIS IS A TYPE OF MALWARE THAT CAN BE INSTALLED ON SYSTEMS VIA SOCIAL ENGINEERING,
UPON EXECUTION OF MALWARE, OR SIMPLY BY BROWSING A MALICIOUS WEBSITE. ONCE
INSTALLED, AN ATTACKER CAN PERFORM VIRTUALLY ANY FUNCTION ON THE SYSTEM INCLUDING
REMOTE ACCESS, HIDE PROCESSES, AND DUPLICATE AND DELETE FILES.
A. Ransomware
B. Bot
C. Fork bomb
D. Rootkit
• IN A PHISHING SITUATION, ATTACKERS TARGET TO USE OF THIS TYPE OF TECHNOLOGY.
A. Wi-fi network
B. Surveillance camera
C. Emails
D. Operating systems
• IN A PHISHING SITUATION, ATTACKERS TARGET TO USE OF THIS TYPE OF TECHNOLOGY.
A. Wi-fi network
B. Surveillance camera
C. Emails
D. Operating systems
• WHEN YOU SEND EMAIL TO MORE THAN ONE PERSON, MAKE SURE THE CONTENT IS
APPROPRIATE FOR ALL RECIPIENTS.
A. Distribution list
B. conflict
C. misaddressing
D. Multiple recipients
• WHEN YOU SEND EMAIL TO MORE THAN ONE PERSON, MAKE SURE THE CONTENT IS
APPROPRIATE FOR ALL RECIPIENTS.
A. Distribution list
B. conflict
C. misaddressing
D. Multiple recipients
• NAME THE THREE THINGS NEEDED TO ASSURE ENCRYPTION IS PROPERLY USED.
A. Backup
B. Encryption
C. Deleting
D. locking
• THIS IS A WAY TO CONCEAL INFORMATION BY ALTERING IT SO THAT IT APPEARS TO BE RANDOM
DATA SO THAT ONLY AUTHORIZED PARTIES CAN UNDERSTAND THE INFORMATION.
A. Backup
B. Encryption
C. Deleting
D. locking
• WHICH OF THE FOLLOWING ATTACKS DOES A FIREWALL PROTECTS?
A. Virus
B. Worm
C. denial of service
D. fork bomb
• WHICH OF THE FOLLOWING ATTACKS DOES A FIREWALL PROTECTS?
A. Virus
B. Worm
C. denial of service
D. fork bomb
• ALL ARE WAYS TO AVOID MALWARE INFECTING YOUR SYSTEM UNIT, EXCEPT:
A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
• THE PROCESS OF ATTEMPTING TO ACQUIRE SENSITIVE INFORMATION SUCH AS USERNAMES,
PASSWORDS, AND CREDIT CARD DETAILS BY MASQUERADING AS A TRUSTWORTHY ENTITY
USING BULK EMAIL WHICH TRIES TO EVADE SPAM FILTERS.
A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
• A SMALL, FOCUSED, TARGETED ATTACK VIA EMAIL ON A PARTICULAR PERSON OR
ORGANIZATION WITH THE GOAL TO PENETRATE THEIR DEFENSES.
A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
• A SMALL, FOCUSED, TARGETED ATTACK VIA EMAIL ON A PARTICULAR PERSON OR
ORGANIZATION WITH THE GOAL TO PENETRATE THEIR DEFENSES.
A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
Identify the social engineering vector attack
ANNIE NOW HAS ACCESS TO THE EMPLOYEES' LOGIN
CREDENTIALS, WHICH SHE CAN USE TO ACCESS THE
COMPANY'S SENSITIVE INFORMATION.
SARA NOW HAS ACCESS TO THE EMPLOYEES' LOGIN
CREDENTIALS, WHICH SHE CAN USE TO ACCESS THE
COMPANY'S SENSITIVE INFORMATION.
Phishing
•ERIC IS A CYBERCRIMINAL WHO WANTS TO GAIN ACCESS TO
THE SENSITIVE DATA OF A SPECIFIC ORGANIZATION THRU
VISITING WEBSITE.
•ERIC IS A CYBERCRIMINAL WHO WANTS TO GAIN ACCESS TO
THE SENSITIVE DATA OF A SPECIFIC ORGANIZATION THRU
VISITING WEBSITE.
Water - holing
•EMPLOYEES FALL FOR A SCAMMER BY PROVIDING THE
REQUESTED INFORMATION, THE ATTACKER CAN USE THAT
INFORMATION TO GAIN ACCESS TO THE COMPANY'S
SYSTEMS OR STEAL SENSITIVE DATA OF THE ADDRESSES OF
THE EMPLOYEE.
•EMPLOYEES FALL FOR A SCAMMER BY PROVIDING THE
REQUESTED INFORMATION, THE ATTACKER CAN USE THAT
INFORMATION TO GAIN ACCESS TO THE COMPANY'S
SYSTEMS OR STEAL SENSITIVE DATA OF THE ADDRESSES OF
THE EMPLOYEE.
pretexting
•THE ATTACKER SENDS EMAIL LOGIN DETAILS TO ALL
EMPLOYEES. ONCE AN EMPLOYEE ENTERS THEIR LOGIN
CREDENTIALS ON THE FAKE LOGIN PAGE, THE MANAGER
CAN USE THOSE CREDENTIALS TO ACCESS THE COMPANY'S
EMAIL SYSTEM AND POTENTIALLY SENSITIVE DATA.
•THE ATTACKER SENDS EMAIL LOGIN DETAILS TO ALL
EMPLOYEES. ONCE AN EMPLOYEE ENTERS THEIR LOGIN
CREDENTIALS ON THE FAKE LOGIN PAGE, THE MANAGER
CAN USE THOSE CREDENTIALS TO ACCESS THE COMPANY'S
EMAIL SYSTEM AND POTENTIALLY SENSITIVE DATA.
phishing
• HENRY CONTINUES TO FOLLOW CAMILLE, MAKING HER INCREASINGLY NERVOUS
AND STRESSED. EVENTUALLY, HE BECOMES FRUSTRATED AND DECIDES TO
CHANGE PLAN IN ORDER TO TRY TO PASS HER. HOWEVER, AS HE'S CHANGING
LANES, ANOTHER PERSON SUDDENLY SWERVES INTO HIS PATH, CAUSING HIM
TO CHANGE COURSE AND NARROWLY AVOID A COLLISION.
• HENRY CONTINUES TO FOLLOW CAMILLE, MAKING HER INCREASINGLY NERVOUS
AND STRESSED. EVENTUALLY, HE BECOMES FRUSTRATED AND DECIDES TO
CHANGE PLAN IN ORDER TO TRY TO PASS HER. HOWEVER, AS HE'S CHANGING
LANES, ANOTHER PERSON SUDDENLY SWERVES INTO HIS PATH, CAUSING HIM
TO CHANGE COURSE AND NARROWLY AVOID A COLLISION.
tailgating
•CONNIE CREATES A MALWARE FILE AND LETS OTHER
USERS DOWNLOAD IT FROM HIS WEBSITE.
•CONNIE CREATES A MALWARE FILE AND LETS OTHER
USERS DOWNLOAD IT FROM HIS WEBSITE.
Water-holing
• THE EMAIL THAT ERIN SENDS TO THE EMPLOYEE CONTAINS A LINK THAT
INSTALLS MALICIOUS SOFTWARE ON THE EMPLOYEE'S COMPUTER WHEN
CLICKED. THE SOFTWARE GIVES ERIN REMOTE ACCESS TO THE EMPLOYEE'S
COMPUTER AND ALLOWS HER TO GAIN ACCESS TO THE COMPANY'S NETWORK.
• THE EMAIL THAT ERIN SENDS TO THE EMPLOYEE CONTAINS A LINK THAT
INSTALLS MALICIOUS SOFTWARE ON THE EMPLOYEE'S COMPUTER WHEN
CLICKED. THE SOFTWARE GIVES ERIN REMOTE ACCESS TO THE EMPLOYEE'S
COMPUTER AND ALLOWS HER TO GAIN ACCESS TO THE COMPANY'S NETWORK.
baiting
• ANTHONY WALKS INTO THE COFFEE SHOP STORE DURING PEAK
BUSINESS HOURS, PRETENDING TO BE A CUSTOMER. HE STARTS
BROWSING THROUGH THE DISPLAYS, KEEPING AN EYE ON THE
STORE CLERK WHO IS BEHIND THE COUNTER.
• ANTHONY WALKS INTO THE COFFEE SHOP STORE DURING PEAK
BUSINESS HOURS, PRETENDING TO BE A CUSTOMER. HE STARTS
BROWSING THROUGH THE DISPLAYS, KEEPING AN EYE ON THE
STORE CLERK WHO IS BEHIND THE COUNTER.
Diversion theft