• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Which of the following answers apply to smurf attack? (Select 3)

IP spoofing / DDoS /


Large amount of ICMP echo replies

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2)

Phishing / Social engineering

Unsolicited messages received over an instant messaging system are known as:

SPIM

Using a telephone system to manipulate user into disclosing confidential information is called:

Vishing

Phishing scams targeting a specific group of users are referred to as:

Spear phishing

Which of the following answers apply to xmas attack? (Select 2)

DOS attack / Port scan

Which of the following answers list(s) the characteristic features of pharming?


(Select 2)

DNS poisoning / Domain spoofing

DNS translates:

Domain names into IP addresses

Which of the following answers refers to a DNS poisoning attack?

Pharming

Address Resolution Protocol (ARP) translates:

- IP addresses into MAC addresses


-Network layer addresses into link layer addresses

Which of the following exploits takes advantage of the spoofed MAC address?

ARP poisoning

Which of the following password attacks requires the most computing power?

Brute force

Which of the following password attacks takes advantage of a predefined list of words?

Dictionary attack

Rainbow tables are lookup tables used to speed up the process of password guessing.


(True / False)

True

Which of the following answers refers to the contents of a rainbow table entry?

Hash / Password

The term "typo squatting" refers to a practice of registering misspelled domain name closely resembling other well established and popular domain name in hopes of getting Internet traffic from users who would make errors while typing in the web address in their browsers. (True / False)

True

URL hijacking is also referred to as:

Typo squatting

Which of the following countermeasures prevent shoulder surfing? (Select 2)

Privacy filters / Screensavers

A policy enforcing the use of paper shredder for all discarded documents would be a countermeasure against:

Dumpster diving

What is tailgating?

Gaining unauthorized access to restricted areas by following another person

Phishing scams targeting people holding high positions in an organization or business are known as:

Whaling

Which of the following fall(s) into the category of social engineering attacks? (Select 3)

Whaling / Spear phishing / Vishing

Which of the following terms refers to a rogue access point?

Evil Twin

The term "war driving" refers to:

Scanning for unsecured wireless networks while driving in a car

The practice of sending unsolicited messages over Bluetooth is known as:

Bluejacking