100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
14.5.7 Practice Questions €7,49   In winkelwagen

Tentamen (uitwerkingen)

14.5.7 Practice Questions

 1 keer bekeken  0 keer verkocht
  • Instelling
  • NHA

14.5.7 Practice Questions

Voorbeeld 2 van de 6  pagina's

  • 18 mei 2024
  • 6
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
Alle documenten voor dit vak (1482)
avatar-seller
lizmwikali72
14.5.7 Practice Questions
A malicious person calls an employee from a cell phone. She tells the employee
that she is the vice president over the accounting department in the employee's
company. She relates that she has forgotten her password and demands that the
employee give her his password so that she can access the reports she needs
for an upcoming presentation. She threatens to fire the employee if he does not
comply.

Which of the following BEST describes the type of attack that just occurred? -
CORRECT ANSWER-> Vishing

Explanation:
A vishing attack has occurred. Vishing involves an attacker convincing authorized
personnel over the phone to grant them access to protected information by
pretending to be someone who is authorized and/or requires that access. Often,
the attacker poses as a member of senior management. A sense of urgency is
typically fabricated to motivate the user to act quickly.
Tailgating is an attempt to closely follow an authorized user into a secure building
or space without providing the appropriate control measure, such as a badge.
Phishing is a computer-based social engineering attack that involves sending an
email that looks legitimate, but encourages the victim to click a link that takes
them to a malicious website or downloads a malware file.
Eavesdropping is listening in on a conversation to gather sensitive information.

Which of the following is a form of attack that tricks victims into providing
confidential information, such as identity information or logon credentials, through
emails or websites that impersonate an online entity that the victim trusts, such
as a financial institution or well-known e-commerce site? - CORRECT
ANSWER-> Phishing

Explanation:
Phishing tricks victims into providing confidential information, such as identity
information or logon credentials, through emails or websites that impersonate an
online entity that the victim trusts, such as a financial institution or well known
e-commerce site. Phishing is a specific form of social engineering.

, Social engineering is the general term that covers a variety of computer-based
and human-based security attacks.
An evil twin attack is used to knock users off of a legitimate, secure wireless
network and redirect them to a malicious wireless network with the same SSID.
Impersonation is an attack method where the attacker impersonates a legitimate
worker that should be granted access to the building.

At company headquarters, several employees are having issues with their Wi-Fi
access suddenly dropping and then reconnecting to the same wireless network.

You decide to investigate and determine that someone has set up a rogue
access point near company headquarters and is using it to capture sensitive data
from the company network.

Which type of social engineering attack is being used? - CORRECT ANSWER->
Evil twin

Explanation:
An evil twin attack involves an attacker setting up a rogue Wi-Fi access point,
using a jamming or disassociation attack to knock users off the legitimate
network, and then having users reconnect to the rogue access point in order to
gain access to sensitive data.
Phishing is an attempt to trick a user into compromising personal information or
downloading malware. Most often, it involves an email containing a malicious
attachment or hyperlink.
Impersonation is an attack method where the attacker impersonates a legitimate
worker that should be granted access to the building or sensitive information.
Eavesdropping means to listen in on other people's conversations in order to
gather sensitive information.

Which type of DoS attack exhausts the target's resources by overloading a
specific program or service? - CORRECT ANSWER-> Application layer

Explanation:
The goal of an Application layer DoS is to exhaust the target's resources by
overloading a specific program or service.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper lizmwikali72. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €7,49. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 76710 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€7,49
  • (0)
  Kopen