Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Which of the following answers apply to smurf attack? (Select 3) |
IP spoofing / DDoS / Large amount of ICMP echo replies |
|
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2) |
Phishing / Social engineering |
|
Unsolicited messages received over an instant messaging system are known as: |
SPIM |
|
Using a telephone system to manipulate user into disclosing confidential information is called: |
Vishing |
|
Phishing scams targeting a specific group of users are referred to as: |
Spear phishing |
|
Which of the following answers apply to xmas attack? (Select 2) |
DOS attack / Port scan |
|
Which of the following answers list(s) the characteristic features of pharming? (Select 2) |
DNS poisoning / Domain spoofing |
|
DNS translates: |
Domain names into IP addresses |
|
Which of the following answers refers to a DNS poisoning attack? |
Pharming |
|
Address Resolution Protocol (ARP) translates: |
- IP addresses into MAC addresses -Network layer addresses into link layer addresses |
|
Which of the following exploits takes advantage of the spoofed MAC address? |
ARP poisoning |
|
Which of the following password attacks requires the most computing power? |
Brute force |
|
Which of the following password attacks takes advantage of a predefined list of words? |
Dictionary attack |
|
Rainbow tables are lookup tables used to speed up the process of password guessing. (True / False) |
True |
|
Which of the following answers refers to the contents of a rainbow table entry? |
Hash / Password |
|
The term "typo squatting" refers to a practice of registering misspelled domain name closely resembling other well established and popular domain name in hopes of getting Internet traffic from users who would make errors while typing in the web address in their browsers. (True / False) |
True |
|
URL hijacking is also referred to as: |
Typo squatting |
|
Which of the following countermeasures prevent shoulder surfing? (Select 2) |
Privacy filters / Screensavers |
|
A policy enforcing the use of paper shredder for all discarded documents would be a countermeasure against: |
Dumpster diving |
|
What is tailgating? |
Gaining unauthorized access to restricted areas by following another person |
|
Phishing scams targeting people holding high positions in an organization or business are known as: |
Whaling |
|
Which of the following fall(s) into the category of social engineering attacks? (Select 3) |
Whaling / Spear phishing / Vishing |
|
Which of the following terms refers to a rogue access point? |
Evil Twin |
|
The term "war driving" refers to: |
Scanning for unsecured wireless networks while driving in a car |
|
The practice of sending unsolicited messages over Bluetooth is known as: |
Bluejacking |