100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Security Awareness Test Questions and Answers Fully Solved $14.99   Add to cart

Exam (elaborations)

Security Awareness Test Questions and Answers Fully Solved

 6 views  0 purchase
  • Course
  • Annual security awareness refresher
  • Institution
  • Annual Security Awareness Refresher

Security Awareness Test

Preview 2 out of 5  pages

  • September 2, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Annual security awareness refresher
  • Annual security awareness refresher
avatar-seller
julianah420
Security Awareness Test


Username - answer A unique name used for identification in a computer system or
website.

Password - answer A secret combination of letters, numbers, and/or symbols that
ideally only the user would know.

Password Weakness - answer Difficult to remember, must remember multiple
passwords for multiple accounts.

Weak Password - answer Uses common words, short password, a predictable
sequence of characters, or personal information. Also reuses same password for other
accounts.

123456 - answer Number one most common password

Online guessing - answer The attacker attempts to randomly guess the password by
typing different variations at the password login prompt.

Offline cracking - answer Attacker steal the file of password digests and then use their
own powerful computers to break the password. The attacker creates their own
passwords and then generating digests for these password. They compare their digests
to their stolen digests.

Brute force attack - answerA password attack in which every possible combination of
letters, numbers, and characters is used to match passwords in a stolen password file.
Slowest method but most thorough method.

Dictionary attack - answerA password attack that com-pares common dictionary words
against those in a stolen password fil

Unexpected Email - answerSocial Engineering Attack: An unanticipated email
containing a link or a file attachment. Clicking on the link is the action, result could be
computer may become infected with malware

Urgent plea of help - answerSocial Engineering Attack: An email from an acquaintance
saying needs money immediately and wants to wire money. Sending the money to
account is the action, result could be sending it to the attacker's account.

, Text Message Warning - answerSocial Engineering Attack: Receive a text message on
a phone saying call the number to give your social security number, bank info, etc.
Provide bank information is the action, result could be attacker now has card
information.

Disaster Video - answerSocial Engineering Attack: A website about a recent weather
incident that asks the user to donate for the people affected by the event. Action could
be download video to computer, result would be could contain malware.

Social Engineering - answerRelies on an attacker's clever manipulation of the human
nature in order to persuade the victim to provide info or take action.

Authority - answerSocial Engineering Principle: Directed by someone impersonating
authority figure or falsely citing their authority.

Intimidation - answerSocial Engineering Principle: To frighten and coerce by threat

Consensus/social proof - answerSocial Engineering Principle: Influenced by what others
do

Scarcity - answerSocial Engineering Principle: Something is in short supply

Urgency - answerSocial Engineering Principle: Immediate action is needed

Familiarity/liking - answerSocial Engineering Principle: Victim is well known and well
received

Trust - answerSocial Engineering Principle: Confidence

Phishing - answerMost common forms of social engineering. Sending an email or
displaying a web announcement that falsely claims to be from a legitimate enterprise in
an attempt to trick the user into surrendering private information.

Spear Phishing - answerTarget specifics users. The emails are customized to the
recipients, including their names, personal information, in order to make a message
appear legitimate.

Whaling - answerType of Spear Phishing. These targets are wealthy individuals such as
CEO's.

Vishing - answerVoice Phishing, an attacker calls a victim who hears a recorded
message that pretends to be from the user's bank stating that her credit card has
experienced fraudulent activity or that her bank account has had unusual activity. The
victim is instructed to call a specific phone number immediately.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83225 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart