Filters
Question type

Study Flashcards

When creating a password,users tend to use


A) All capital letters
B) Passwords that are too long
C) Names of family,pets,or teams
D) Numbers only

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The process of convincing an authorized individual to provide confidential information or access to an unauthorized individual is known as _______________.

Correct Answer

verifed

verified

What are the security risks of installing games on an organization's system?


A) There are no significant risks.
B) Users can't always be sure where the software came from and it may have hidden software inside of it.
C) The users may play during work hours instead of during breaks.
D) The games may take up too much memory on the computer and slow down processing making it difficult to work.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

When an attacker attempts to get sensitive information from a target using voice communication technology,it is called _______________.

Correct Answer

verifed

verified

Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be.Create a bulleted list of those responsibilities.

Correct Answer

verifed

verified

The following are examples:
Lock the doo...

View Answer

Phishing is the most common form of social engineering attack related to computer security.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the weakest password?


A) I@w3us1@!
B) P@ $$w0rd
C) C#as%t*1ng
D) H#e31L9pM3 Even though the password has eight characters,uppercase,lowercase,and special characters,it spells a common word and may be one of the words in a password cracking dictionary.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

When and attacker tries to convince the target to initiate contact and then gets the target to give up confidential information,this is known as


A) Social engineering
B) Reverse social engineering
C) Piggybacking
D) Flim flam

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Spear phishing is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.

A) True
B) False

Correct Answer

verifed

verified

All of the following are characteristics of a strong password EXCEPT:


A) Contains numbers and letters
B) Contains at least eight characters
C) Contains an uncommon dictionary word
D) Contains special characters,i.e. ,*%$#@

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

The only means of social engineering is through direct contact between the target and the attacker.

A) True
B) False

Correct Answer

verifed

verified

The process of going through a target's trash in hopes of finding valuable information that might be used in a penetration attempt is known as _______________.

Correct Answer

verifed

verified

Users on your network receive an e-mail warning them of a dangerous computer virus.It instructs the user to delete files it claims were put there by the virus,but they are actually critical system files.This is an example of


A) Social engineering
B) Reverse social engineering
C) A hoax
D) Phishing

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A person parks his car by an ATM,sets up a small camera discreetly pointed at ATM keypad,and then pretends to be going through bank papers in his car.This would be an example of


A) Piggybacking
B) Shoulder surfing
C) Phishing
D) Social engineering

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Installing unauthorized hardware such as a communication software and modem


A) Is a common practice and does not affect the organization
B) May cause a security breach and allow an intruder to have access to an organization's system by opening up a backdoor
C) Boosts the system so downloading from the Internet will be faster
D) Saves the company from buying a license by using other software

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Write a password policy that your company will have to follow to ensure strong passwords.

Correct Answer

verifed

verified

Use a mix of uppercase and low...

View Answer

Shoulder surfing is when a person looks over the shoulder of another person while typing pins or passwords.

A) True
B) False

Correct Answer

verifed

verified

Attackers need a certain amount of information before launching their attack.One common place to find information is to go through the trash of the target to find information that could be useful to the attacker.This process of going through a target's trash is known in the community as


A) Trash rummaging
B) Garbage surfing
C) Piggy diving
D) Dumpster diving

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

_______________ is a type of social engineering in which the attacker attempts to obtain sensitive information from a user by masquerading as a trusted entity in an e-mail or instant message sent to a large group of (often)random users.

Correct Answer

verifed

verified

One of the most effective tools for foiling the efforts of a social engineering attack is an active security awareness program.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 40

Related Exams

Show Answer