IST 275 Chapter 13 & 14 Testout

17 June 2023
4.9 (102 reviews)
13 test answers

Unlock all answers in this set

Unlock answers (9)
question
What is the primary countermeasure to social engineering? What is the primary countermeasure to social engineering?
answer
Awareness
question
Which of the following are examples of social engineering? (Select two.) Which of the following are examples of social engineering? (Select two.)
answer
Shoulder surfing Dumpster diving
question
How can an organization help prevent social engineering attacks? (Select two.)
answer
Publish and enforce clearly written security policies employees on the risks and countermeasures Educate
question
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. using their username and password. What type of attack is this?
answer
Phishing
question
A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn't know and he is project that is behind production. The email is sent from someone she doesn't know and he is asking for immediate clarification on several of the project's details so the project can get back on asking for immediate clarification on several of the project's details so the project can get back on schedule. schedule. Which type of an attack best describes the scenario
answer
Whaling
question
Which of the following is a common form of social engineering attack?
answer
Hoax virus information e-mails.
question
Which of the following is not not a form of social engineering?
answer
Impersonating a user by logging on with stolen credentials
question
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you need enter your username and password at a new website so you can manage your email and spam using the new service. What should you do? What should you do?
answer
Verify that the email was sent by the administrator and that this new service is legitimate.
question
your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
answer
enforce a document destruction policy
question
What is the primary difference between impersonation and masquerading?
answer
One is more active, the other is more passive
question
Match the social engineering description on the left with the appropriate attack type on the right. Match the social engineering description on the left with the appropriate attack type on the right
answer
Phishing An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. Whaling An attacker gathers personal information about the target individual, who is a CEO. Spear phishing An attacker gathers personal information about the target individual in an organization. . Dumpster diving An attacker searches through an organization's trash for sensitive information. Piggybacking An attacker enters a secured building by following an authorized employee through a secure door without providing identification. Vishing An attacker uses a telephone to convince target individuals to reveal their credit card information.
question
Which of the following statements about the use of anti-virus software is correct?
answer
Anti-virus software should be configured to download updated virus definition files as soon as they become available