1_1_9 Section 1 – Attacks, Threats, and Vulnerabilities - Social Engineering - Other Social Engineering Attacks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is tailgating in the context of office security?

  • Using a badge to gain access
  • Unauthorized individual following someone through a secure door (correct)
  • Following safety guidelines in the office
  • Bringing food into the office

What is the main motivation for someone to engage in tailgating?

  • Gaining unauthorized access to the building (correct)
  • Accidentally entering the building
  • Trying to socialize with colleagues
  • Getting free food from inside the building

How does Johnny Long demonstrate tailgating in his book, No Tech Hacking?

  • Using third-party clothing to blend in and gain access (correct)
  • Pretending to be a vendor inside the building
  • Hacking computer systems remotely
  • Creating a distraction to enter the building

What is a common tactic used by individuals engaging in tailgating at the office?

<p>Pretending to be on a break in the smoking section (B)</p> Signup and view all the answers

How do some individuals exploit the kindness of others to gain entry through a secure door?

<p>By supplying food or treats and getting someone to hold the door open (A)</p> Signup and view all the answers

Why is preventing tailgating important in an office environment?

<p>To ensure the last line of defense before sensitive areas (D)</p> Signup and view all the answers

What is the purpose of a visitor badge in most organizations?

<p>To identify individuals who are allowed inside the building (D)</p> Signup and view all the answers

What does the sign 'no tailgating, or one scan, one person' near a locked door signify?

<p>Only one person should enter after a single badge scan (A)</p> Signup and view all the answers

What is a common tactic used in an invoice scam?

<p>Spoofing email addresses of high-level authorities (C)</p> Signup and view all the answers

Why might an accounting department pay a fake invoice without proper verification?

<p>The invoice looks legitimate and is from a familiar source (D)</p> Signup and view all the answers

What is a credential harvesting attack focused on acquiring?

<p>Usernames and passwords (D)</p> Signup and view all the answers

How might an attacker execute a credential harvesting attack through email?

<p>Sending a Microsoft Word document with malicious macros (D)</p> Signup and view all the answers

Why is it crucial for users to have antivirus and anti-malware software?

<p>To detect and stop credential harvesting attacks (A)</p> Signup and view all the answers

What is the main goal of someone engaging in tailgating in an office environment?

<p>To gain unauthorized access to the inside by following someone through a secured door (D)</p> Signup and view all the answers

How might a person using tailgating blend in to gain unauthorized access?

<p>Pretending to be a delivery person from a known vendor (A)</p> Signup and view all the answers

What social engineering aspect is associated with tailgating?

<p>Deceiving employees to hold the door open for them (B)</p> Signup and view all the answers

In Johnny Long's book, how does he demonstrate gaining access through tailgating?

<p>By using clothing from a third-party vendor to blend in (A)</p> Signup and view all the answers

What is a common ruse used by individuals engaging in tailgating to gain entry?

<p>Claiming to be an IT technician fixing a computer issue (D)</p> Signup and view all the answers

What tactic might an individual use while tailgating to ensure someone holds the door open for them?

<p>Offering to share their food or treats with others (A)</p> Signup and view all the answers

What is a common tactic used in a credential harvesting attack?

<p>Tricking the victim into opening a malicious Microsoft Word document (B)</p> Signup and view all the answers

What is the primary purpose of a visitor badge in most organizations?

<p>To identify individuals who are not regular members of the organization (B)</p> Signup and view all the answers

How might an attacker gain access to usernames and passwords through a credential harvesting attack?

<p>Extracting stored credentials using a malicious script (C)</p> Signup and view all the answers

What is the danger of an attacker successfully executing a credential harvesting attack?

<p>Stealing sensitive information without the victim's knowledge (A)</p> Signup and view all the answers

Why do some attackers prefer sending a scam invoice with a spoofed address?

<p>To trick the accounting department into making payments without verification (B)</p> Signup and view all the answers

How does an attacker often attempt to trick users into executing a script that extracts credentials?

<p>By sending emails with malicious Microsoft Word document attachments (A)</p> Signup and view all the answers

What is the significance of organizations having policies related to visitor badges?

<p>To prevent tailgating through secure doors (B)</p> Signup and view all the answers

How does clicking on a link in a scam invoice email benefit an attacker?

<p>Acquiring credit card or bank account details (C)</p> Signup and view all the answers

What is the purpose of signs like 'no tailgating, or one scan, one person' near locked doors?

<p>To remind individuals not to hold the door for others behind them (D)</p> Signup and view all the answers

What is the potential consequence of an accounting department paying a fraudulent invoice without proper verification?

<p>Erosion of trust between employees and management in the organization (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Clean Desk Policy Quiz
6 questions

Clean Desk Policy Quiz

CommendableRuby avatar
CommendableRuby
Clear Desk Policy Document Control
16 questions
Workplace Safety and Security Quiz
9 questions
Política de Escritorio Limpio en la Oficina
24 questions
Use Quizgecko on...
Browser
Browser