100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
14.5.7 Practice Questions $7.99   Add to cart

Exam (elaborations)

14.5.7 Practice Questions

 1 view  0 purchase
  • Course
  • Institution

14.5.7 Practice Questions

Preview 2 out of 6  pages

  • May 18, 2024
  • 6
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
14.5.7 Practice Questions
A malicious person calls an employee from a cell phone. She tells the employee
that she is the vice president over the accounting department in the employee's
company. She relates that she has forgotten her password and demands that the
employee give her his password so that she can access the reports she needs
for an upcoming presentation. She threatens to fire the employee if he does not
comply.

Which of the following BEST describes the type of attack that just occurred? -
CORRECT ANSWER-> Vishing

Explanation:
A vishing attack has occurred. Vishing involves an attacker convincing authorized
personnel over the phone to grant them access to protected information by
pretending to be someone who is authorized and/or requires that access. Often,
the attacker poses as a member of senior management. A sense of urgency is
typically fabricated to motivate the user to act quickly.
Tailgating is an attempt to closely follow an authorized user into a secure building
or space without providing the appropriate control measure, such as a badge.
Phishing is a computer-based social engineering attack that involves sending an
email that looks legitimate, but encourages the victim to click a link that takes
them to a malicious website or downloads a malware file.
Eavesdropping is listening in on a conversation to gather sensitive information.

Which of the following is a form of attack that tricks victims into providing
confidential information, such as identity information or logon credentials, through
emails or websites that impersonate an online entity that the victim trusts, such
as a financial institution or well-known e-commerce site? - CORRECT
ANSWER-> Phishing

Explanation:
Phishing tricks victims into providing confidential information, such as identity
information or logon credentials, through emails or websites that impersonate an
online entity that the victim trusts, such as a financial institution or well known
e-commerce site. Phishing is a specific form of social engineering.

, Social engineering is the general term that covers a variety of computer-based
and human-based security attacks.
An evil twin attack is used to knock users off of a legitimate, secure wireless
network and redirect them to a malicious wireless network with the same SSID.
Impersonation is an attack method where the attacker impersonates a legitimate
worker that should be granted access to the building.

At company headquarters, several employees are having issues with their Wi-Fi
access suddenly dropping and then reconnecting to the same wireless network.

You decide to investigate and determine that someone has set up a rogue
access point near company headquarters and is using it to capture sensitive data
from the company network.

Which type of social engineering attack is being used? - CORRECT ANSWER->
Evil twin

Explanation:
An evil twin attack involves an attacker setting up a rogue Wi-Fi access point,
using a jamming or disassociation attack to knock users off the legitimate
network, and then having users reconnect to the rogue access point in order to
gain access to sensitive data.
Phishing is an attempt to trick a user into compromising personal information or
downloading malware. Most often, it involves an email containing a malicious
attachment or hyperlink.
Impersonation is an attack method where the attacker impersonates a legitimate
worker that should be granted access to the building or sensitive information.
Eavesdropping means to listen in on other people's conversations in order to
gather sensitive information.

Which type of DoS attack exhausts the target's resources by overloading a
specific program or service? - CORRECT ANSWER-> Application layer

Explanation:
The goal of an Application layer DoS is to exhaust the target's resources by
overloading a specific program or service.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller lizmwikali72. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77764 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart