Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
What is Social Engineering? |
A hacker trying to trick an employee into compromising security through social contact such as a phone call or e-mail message. |
|
Six types of social engineering attacks are? |
|
|
Reasons why Social engineering is effective. |
|
|
Name four types of Network Attacks? |
|
|
Name three types of Spoofing packets? |
|
|
Two Types of Poisoning are? |
|
|
The LMhost file is used to? |
Resolve NetBIOS names to IP addresses. |
|
What is Spoofing? |
A spoof attack is when hacker modifies the source address of the packet. IPs, Macs, and email address can be spoofed. |
|
Name two methods to prevent ARP poisoning? |
|
|
Name one methods to prevent DNS poisoning? |
Patching |
|
What is Domain kiting? |
Hacker uses the five day grace period over and over again without paying. |
|
What is Cross Scripting (XSS)? |
Inserting script code into a web page of that processes are re-directed to the hackers page. |
|
What is the difference between Blue-jacking and Blue-snarfing? |
Blue-jacking is text message and Blue-snarfing uses blue tooth devices. |