quiz image

1_2_10 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - Physical attacks

UnmatchedMandolin avatar
UnmatchedMandolin
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What type of physical attack involves a malicious USB cable masquerading as a normal cable?

Red cable attack

When a malicious USB cable is plugged in, what can it act as due to its additional electronics?

A keyboard/mouse

What risk does plugging in a malicious USB cable pose to a system?

Downloading malware

Why is it advised not to plug in any USB cable that is found without proper knowledge of its source?

<p>To prevent potential system infection</p> Signup and view all the answers

What potential issue may arise from plugging in a malicious flash drive found in a parking lot?

<p>System compromise</p> Signup and view all the answers

Why do most people consider plugging in a flash drive they find as a bad idea?

<p>To avoid potential risks and compromises</p> Signup and view all the answers

What is a common security concern related to older operating systems when plugging in a flash drive?

<p>Automated programs running from the flash drive</p> Signup and view all the answers

How can attackers infect a system through a USB flash drive even without the human interface device functionality?

<p>By inserting malicious software into PDF files on the flash drive</p> Signup and view all the answers

What technique involves stealing credit card information by copying details from the magnetic stripe or computer system?

<p>Skimming</p> Signup and view all the answers

How do attackers gather credit card information during skimming at an ATM?

<p>By monitoring the user's PIN with a camera</p> Signup and view all the answers

Why should you be cautious when using a card reader according to the text?

<p>To protect against fraudulent skimming attempts</p> Signup and view all the answers

What is one way attackers can use stolen credit card information obtained through skimming?

<p>To clone another physical card</p> Signup and view all the answers

How do some banks try to prevent unauthorized skimmers from manipulating their ATMs?

<p>By putting oddly-molded plastic around the ATM structure</p> Signup and view all the answers

What does skimming involve in relation to credit card information?

<p>Cloning card details while in use for other purposes</p> Signup and view all the answers

What is one method attackers use to attempt to gain access to internal networks through USB devices?

<p>Using wireless technology to remotely connect to USB drives</p> Signup and view all the answers

How can attackers misuse USB flash drives to infect systems during the boot process?

<p>By configuring the USB interface with a boot device and infecting the system during restarts</p> Signup and view all the answers

What categorization do malicious USB cables attempt to masquerade as?

<p>Human interface device</p> Signup and view all the answers

How do malicious USB cables initiate unauthorized actions on a system?

<p>By pretending to be a keyboard or mouse</p> Signup and view all the answers

What risk do individuals face when plugging in a seemingly normal flash drive found in a parking lot?

<p>Potential malware infection</p> Signup and view all the answers

What is the primary danger associated with utilizing flash drives of unknown origin?

<p>Potential exposure to malware</p> Signup and view all the answers

In what scenario could an individual's system become infected by malware through a flash drive?

<p>When the flash drive is found on the ground and connected to the system</p> Signup and view all the answers

What precaution should individuals take when considering using USB cables or flash drives of uncertain origin?

<p>Verify the devices with known, reliable sources before usage</p> Signup and view all the answers

What role does additional electronics play in infecting a system with malware via a USB flash drive?

<p>It allows the USB flash drive to mimic a keyboard or mouse for executing malicious commands.</p> Signup and view all the answers

What security risk arises if a user's USB interface is configured with a boot device?

<p>The system could be infected during the boot process from a malicious USB flash drive.</p> Signup and view all the answers

What tactic do attackers commonly use to gather credit card information without the cardholder's knowledge?

<p>Shoulder surfing to visually capture credit card numbers.</p> Signup and view all the answers

How might an attacker use a skimmer at an ATM to gather more than just credit card numbers?

<p>By capturing the cardholder's personal identification number (PIN).</p> Signup and view all the answers

What visual cue can indicate that an ATM has been tampered with by adding an unauthorized skimmer?

<p>Plastic pieces that are colored or illuminated on the outside of the ATM.</p> Signup and view all the answers

Which technique can attackers use to infect a system through files on a USB flash drive without requiring additional electronics for mimicry?

<p>Embedding malicious software within commonly-used file types like PDFs or spreadsheets.</p> Signup and view all the answers

How do some banks attempt to prevent unauthorized skimmers from attaching devices to their ATMs?

<p>Adding uniquely-shaped plastic pieces around the ATM's card reader.</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser