Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 41

Cybersecurity

Review
Multiple Choice
• THIS IS A CONSEQUENCE OF MAIL CLIENTS TRYING TO AUTOFILL AN ADDRESS FROM THE
CHARACTERS TYPED BY THE USER. ALWAYS CHECK IF THE RECIPIENT IS INDEED THE INTENDED
ONE.

A. Distribution list
B. conflict
C. misaddressing
D. Legal issues
• THIS IS A CONSEQUENCE OF MAIL CLIENTS TRYING TO AUTOFILL AN ADDRESS FROM THE
CHARACTERS TYPED BY THE USER. ALWAYS CHECK IF THE RECIPIENT IS INDEED THE INTENDED
ONE.

A. Distribution list
B. conflict
C. misaddressing
D. Legal issues
• THIS IS A TYPE OF MALWARE THAT CAN BE INSTALLED ON SYSTEMS VIA SOCIAL ENGINEERING,
UPON EXECUTION OF MALWARE, OR SIMPLY BY BROWSING A MALICIOUS WEBSITE. ONCE
INSTALLED, AN ATTACKER CAN PERFORM VIRTUALLY ANY FUNCTION ON THE SYSTEM INCLUDING
REMOTE ACCESS, HIDE PROCESSES, AND DUPLICATE AND DELETE FILES.

A. Ransomware
B. Bot
C. Fork bomb
D. Rootkit
• THIS IS A TYPE OF MALWARE THAT CAN BE INSTALLED ON SYSTEMS VIA SOCIAL ENGINEERING,
UPON EXECUTION OF MALWARE, OR SIMPLY BY BROWSING A MALICIOUS WEBSITE. ONCE
INSTALLED, AN ATTACKER CAN PERFORM VIRTUALLY ANY FUNCTION ON THE SYSTEM INCLUDING
REMOTE ACCESS, HIDE PROCESSES, AND DUPLICATE AND DELETE FILES.

A. Ransomware
B. Bot
C. Fork bomb
D. Rootkit
• IN A PHISHING SITUATION, ATTACKERS TARGET TO USE OF THIS TYPE OF TECHNOLOGY.

A. Wi-fi network
B. Surveillance camera
C. Emails
D. Operating systems
• IN A PHISHING SITUATION, ATTACKERS TARGET TO USE OF THIS TYPE OF TECHNOLOGY.

A. Wi-fi network
B. Surveillance camera
C. Emails
D. Operating systems
• WHEN YOU SEND EMAIL TO MORE THAN ONE PERSON, MAKE SURE THE CONTENT IS
APPROPRIATE FOR ALL RECIPIENTS.

A. Distribution list
B. conflict
C. misaddressing
D. Multiple recipients
• WHEN YOU SEND EMAIL TO MORE THAN ONE PERSON, MAKE SURE THE CONTENT IS
APPROPRIATE FOR ALL RECIPIENTS.

A. Distribution list
B. conflict
C. misaddressing
D. Multiple recipients
• NAME THE THREE THINGS NEEDED TO ASSURE ENCRYPTION IS PROPERLY USED.

A. Confidentiality, Integrity, Authenticity


B. Confidentiality, Integrity, Privacy
C. Privacy, Integrity, Authenticity
D. Confidentiality, Privacy, Authenticity
• NAME THE THREE THINGS NEEDED TO ASSURE ENCRYPTION IS PROPERLY USED.

A. Confidentiality, Integrity, Authenticity


B. Confidentiality, Integrity, Privacy
C. Privacy, Integrity, Authenticity
D. Confidentiality, Privacy, Authenticity
• THIS IS A WAY TO CONCEAL INFORMATION BY ALTERING IT SO THAT IT APPEARS TO BE RANDOM
DATA SO THAT ONLY AUTHORIZED PARTIES CAN UNDERSTAND THE INFORMATION.

A. Backup
B. Encryption
C. Deleting
D. locking
• THIS IS A WAY TO CONCEAL INFORMATION BY ALTERING IT SO THAT IT APPEARS TO BE RANDOM
DATA SO THAT ONLY AUTHORIZED PARTIES CAN UNDERSTAND THE INFORMATION.

A. Backup
B. Encryption
C. Deleting
D. locking
• WHICH OF THE FOLLOWING ATTACKS DOES A FIREWALL PROTECTS?

A. Virus
B. Worm
C. denial of service
D. fork bomb
• WHICH OF THE FOLLOWING ATTACKS DOES A FIREWALL PROTECTS?

A. Virus
B. Worm
C. denial of service
D. fork bomb
• ALL ARE WAYS TO AVOID MALWARE INFECTING YOUR SYSTEM UNIT, EXCEPT:

A. Pop-ups are blocked while browsing the Web.


B. File downloadable are selected from sources you trust.
C. Updates of security software are disabled.
D. Unknown email attachments are ignored.
• ALL ARE WAYS TO AVOID MALWARE INFECTING YOUR SYSTEM UNIT, EXCEPT:

A. Pop-ups are blocked while browsing the Web.


B. File downloadable are selected from sources you trust.
C. Updates of security software are disabled.
D. Unknown email attachments are ignored.
• THE PROCESS OF ATTEMPTING TO ACQUIRE SENSITIVE INFORMATION SUCH AS USERNAMES,
PASSWORDS, AND CREDIT CARD DETAILS BY MASQUERADING AS A TRUSTWORTHY ENTITY
USING BULK EMAIL WHICH TRIES TO EVADE SPAM FILTERS.

A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
• THE PROCESS OF ATTEMPTING TO ACQUIRE SENSITIVE INFORMATION SUCH AS USERNAMES,
PASSWORDS, AND CREDIT CARD DETAILS BY MASQUERADING AS A TRUSTWORTHY ENTITY
USING BULK EMAIL WHICH TRIES TO EVADE SPAM FILTERS.

A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
• A SMALL, FOCUSED, TARGETED ATTACK VIA EMAIL ON A PARTICULAR PERSON OR
ORGANIZATION WITH THE GOAL TO PENETRATE THEIR DEFENSES.

A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
• A SMALL, FOCUSED, TARGETED ATTACK VIA EMAIL ON A PARTICULAR PERSON OR
ORGANIZATION WITH THE GOAL TO PENETRATE THEIR DEFENSES.

A. Phishing
B. Pretexting
C. Spear Phishing
D. Rogue
Identify the social engineering vector attack
ANNIE NOW HAS ACCESS TO THE EMPLOYEES' LOGIN
CREDENTIALS, WHICH SHE CAN USE TO ACCESS THE
COMPANY'S SENSITIVE INFORMATION.
SARA NOW HAS ACCESS TO THE EMPLOYEES' LOGIN
CREDENTIALS, WHICH SHE CAN USE TO ACCESS THE
COMPANY'S SENSITIVE INFORMATION.

Phishing
•ERIC IS A CYBERCRIMINAL WHO WANTS TO GAIN ACCESS TO
THE SENSITIVE DATA OF A SPECIFIC ORGANIZATION THRU
VISITING WEBSITE.
•ERIC IS A CYBERCRIMINAL WHO WANTS TO GAIN ACCESS TO
THE SENSITIVE DATA OF A SPECIFIC ORGANIZATION THRU
VISITING WEBSITE.

Water - holing
•EMPLOYEES FALL FOR A SCAMMER BY PROVIDING THE
REQUESTED INFORMATION, THE ATTACKER CAN USE THAT
INFORMATION TO GAIN ACCESS TO THE COMPANY'S
SYSTEMS OR STEAL SENSITIVE DATA OF THE ADDRESSES OF
THE EMPLOYEE.
•EMPLOYEES FALL FOR A SCAMMER BY PROVIDING THE
REQUESTED INFORMATION, THE ATTACKER CAN USE THAT
INFORMATION TO GAIN ACCESS TO THE COMPANY'S
SYSTEMS OR STEAL SENSITIVE DATA OF THE ADDRESSES OF
THE EMPLOYEE.

pretexting
•THE ATTACKER SENDS EMAIL LOGIN DETAILS TO ALL
EMPLOYEES. ONCE AN EMPLOYEE ENTERS THEIR LOGIN
CREDENTIALS ON THE FAKE LOGIN PAGE, THE MANAGER
CAN USE THOSE CREDENTIALS TO ACCESS THE COMPANY'S
EMAIL SYSTEM AND POTENTIALLY SENSITIVE DATA.
•THE ATTACKER SENDS EMAIL LOGIN DETAILS TO ALL
EMPLOYEES. ONCE AN EMPLOYEE ENTERS THEIR LOGIN
CREDENTIALS ON THE FAKE LOGIN PAGE, THE MANAGER
CAN USE THOSE CREDENTIALS TO ACCESS THE COMPANY'S
EMAIL SYSTEM AND POTENTIALLY SENSITIVE DATA.

phishing
• HENRY CONTINUES TO FOLLOW CAMILLE, MAKING HER INCREASINGLY NERVOUS
AND STRESSED. EVENTUALLY, HE BECOMES FRUSTRATED AND DECIDES TO
CHANGE PLAN IN ORDER TO TRY TO PASS HER. HOWEVER, AS HE'S CHANGING
LANES, ANOTHER PERSON SUDDENLY SWERVES INTO HIS PATH, CAUSING HIM
TO CHANGE COURSE AND NARROWLY AVOID A COLLISION.
• HENRY CONTINUES TO FOLLOW CAMILLE, MAKING HER INCREASINGLY NERVOUS
AND STRESSED. EVENTUALLY, HE BECOMES FRUSTRATED AND DECIDES TO
CHANGE PLAN IN ORDER TO TRY TO PASS HER. HOWEVER, AS HE'S CHANGING
LANES, ANOTHER PERSON SUDDENLY SWERVES INTO HIS PATH, CAUSING HIM
TO CHANGE COURSE AND NARROWLY AVOID A COLLISION.

tailgating
•CONNIE CREATES A MALWARE FILE AND LETS OTHER
USERS DOWNLOAD IT FROM HIS WEBSITE.
•CONNIE CREATES A MALWARE FILE AND LETS OTHER
USERS DOWNLOAD IT FROM HIS WEBSITE.

Water-holing
• THE EMAIL THAT ERIN SENDS TO THE EMPLOYEE CONTAINS A LINK THAT
INSTALLS MALICIOUS SOFTWARE ON THE EMPLOYEE'S COMPUTER WHEN
CLICKED. THE SOFTWARE GIVES ERIN REMOTE ACCESS TO THE EMPLOYEE'S
COMPUTER AND ALLOWS HER TO GAIN ACCESS TO THE COMPANY'S NETWORK.
• THE EMAIL THAT ERIN SENDS TO THE EMPLOYEE CONTAINS A LINK THAT
INSTALLS MALICIOUS SOFTWARE ON THE EMPLOYEE'S COMPUTER WHEN
CLICKED. THE SOFTWARE GIVES ERIN REMOTE ACCESS TO THE EMPLOYEE'S
COMPUTER AND ALLOWS HER TO GAIN ACCESS TO THE COMPANY'S NETWORK.

Quid Pro quo


• FIRST, ALLAN VISITS A COFFEE SHOP NEAR THE COMPANY'S OFFICE AND INTENTIONALLY LEAVES BEHIND A
USB DRIVE THAT CONTAINS MALICIOUS SOFTWARE. THE USB DRIVE IS DISGUISED AS A HARMLESS ITEM,
SUCH AS A KEYCHAIN OR A PEN, TO MAKE IT MORE ATTRACTIVE TO SOMEONE WHO FINDS IT. AN
EMPLOYEE OF THE TARGET COMPANY HAPPENS TO FIND THE USB DRIVE AND TAKES IT TO THEIR OFFICE.
THEY PLUG THE USB DRIVE INTO THEIR COMPUTER TO SEE IF THERE IS ANY INFORMATION ON IT THAT
COULD HELP THEM IDENTIFY ITS OWNER.
• FIRST, ALLAN VISITS A COFFEE SHOP NEAR THE COMPANY'S OFFICE AND INTENTIONALLY LEAVES BEHIND A
USB DRIVE THAT CONTAINS MALICIOUS SOFTWARE. THE USB DRIVE IS DISGUISED AS A HARMLESS ITEM,
SUCH AS A KEYCHAIN OR A PEN, TO MAKE IT MORE ATTRACTIVE TO SOMEONE WHO FINDS IT. AN
EMPLOYEE OF THE TARGET COMPANY HAPPENS TO FIND THE USB DRIVE AND TAKES IT TO THEIR OFFICE.
THEY PLUG THE USB DRIVE INTO THEIR COMPUTER TO SEE IF THERE IS ANY INFORMATION ON IT THAT
COULD HELP THEM IDENTIFY ITS OWNER.

baiting
• ANTHONY WALKS INTO THE COFFEE SHOP STORE DURING PEAK
BUSINESS HOURS, PRETENDING TO BE A CUSTOMER. HE STARTS
BROWSING THROUGH THE DISPLAYS, KEEPING AN EYE ON THE
STORE CLERK WHO IS BEHIND THE COUNTER.
• ANTHONY WALKS INTO THE COFFEE SHOP STORE DURING PEAK
BUSINESS HOURS, PRETENDING TO BE A CUSTOMER. HE STARTS
BROWSING THROUGH THE DISPLAYS, KEEPING AN EYE ON THE
STORE CLERK WHO IS BEHIND THE COUNTER.

Diversion theft

You might also like