1_2_10 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - Physical attacks
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of physical attack involves a malicious USB cable masquerading as a normal cable?

  • Green cable attack
  • Red cable attack (correct)
  • Blue cable attack
  • Yellow cable attack
  • When a malicious USB cable is plugged in, what can it act as due to its additional electronics?

  • A printer
  • A keyboard/mouse (correct)
  • A scanner
  • A monitor
  • What risk does plugging in a malicious USB cable pose to a system?

  • Increasing RAM speed
  • Downloading malware (correct)
  • Overclocking the CPU
  • Improving network security
  • Why is it advised not to plug in any USB cable that is found without proper knowledge of its source?

    <p>To prevent potential system infection</p> Signup and view all the answers

    What potential issue may arise from plugging in a malicious flash drive found in a parking lot?

    <p>System compromise</p> Signup and view all the answers

    Why do most people consider plugging in a flash drive they find as a bad idea?

    <p>To avoid potential risks and compromises</p> Signup and view all the answers

    What is a common security concern related to older operating systems when plugging in a flash drive?

    <p>Automated programs running from the flash drive</p> Signup and view all the answers

    How can attackers infect a system through a USB flash drive even without the human interface device functionality?

    <p>By inserting malicious software into PDF files on the flash drive</p> Signup and view all the answers

    What technique involves stealing credit card information by copying details from the magnetic stripe or computer system?

    <p>Skimming</p> Signup and view all the answers

    How do attackers gather credit card information during skimming at an ATM?

    <p>By monitoring the user's PIN with a camera</p> Signup and view all the answers

    Why should you be cautious when using a card reader according to the text?

    <p>To protect against fraudulent skimming attempts</p> Signup and view all the answers

    What is one way attackers can use stolen credit card information obtained through skimming?

    <p>To clone another physical card</p> Signup and view all the answers

    How do some banks try to prevent unauthorized skimmers from manipulating their ATMs?

    <p>By putting oddly-molded plastic around the ATM structure</p> Signup and view all the answers

    What does skimming involve in relation to credit card information?

    <p>Cloning card details while in use for other purposes</p> Signup and view all the answers

    What is one method attackers use to attempt to gain access to internal networks through USB devices?

    <p>Using wireless technology to remotely connect to USB drives</p> Signup and view all the answers

    How can attackers misuse USB flash drives to infect systems during the boot process?

    <p>By configuring the USB interface with a boot device and infecting the system during restarts</p> Signup and view all the answers

    What categorization do malicious USB cables attempt to masquerade as?

    <p>Human interface device</p> Signup and view all the answers

    How do malicious USB cables initiate unauthorized actions on a system?

    <p>By pretending to be a keyboard or mouse</p> Signup and view all the answers

    What risk do individuals face when plugging in a seemingly normal flash drive found in a parking lot?

    <p>Potential malware infection</p> Signup and view all the answers

    What is the primary danger associated with utilizing flash drives of unknown origin?

    <p>Potential exposure to malware</p> Signup and view all the answers

    In what scenario could an individual's system become infected by malware through a flash drive?

    <p>When the flash drive is found on the ground and connected to the system</p> Signup and view all the answers

    What precaution should individuals take when considering using USB cables or flash drives of uncertain origin?

    <p>Verify the devices with known, reliable sources before usage</p> Signup and view all the answers

    What role does additional electronics play in infecting a system with malware via a USB flash drive?

    <p>It allows the USB flash drive to mimic a keyboard or mouse for executing malicious commands.</p> Signup and view all the answers

    What security risk arises if a user's USB interface is configured with a boot device?

    <p>The system could be infected during the boot process from a malicious USB flash drive.</p> Signup and view all the answers

    What tactic do attackers commonly use to gather credit card information without the cardholder's knowledge?

    <p>Shoulder surfing to visually capture credit card numbers.</p> Signup and view all the answers

    How might an attacker use a skimmer at an ATM to gather more than just credit card numbers?

    <p>By capturing the cardholder's personal identification number (PIN).</p> Signup and view all the answers

    What visual cue can indicate that an ATM has been tampered with by adding an unauthorized skimmer?

    <p>Plastic pieces that are colored or illuminated on the outside of the ATM.</p> Signup and view all the answers

    Which technique can attackers use to infect a system through files on a USB flash drive without requiring additional electronics for mimicry?

    <p>Embedding malicious software within commonly-used file types like PDFs or spreadsheets.</p> Signup and view all the answers

    How do some banks attempt to prevent unauthorized skimmers from attaching devices to their ATMs?

    <p>Adding uniquely-shaped plastic pieces around the ATM's card reader.</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser