Social Engineering and Spear Phishing Quiz
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary goal of spear phishing?

  • To collect public information about a target
  • To provide IT support
  • To compromise the target computer (correct)
  • To monitor wireless networks
  • Which of the following is not a common social engineering tactic?

  • Like likes like
  • Friendly
  • Name dropping
  • Overloading with information (correct)
  • Which of these methods is NOT used to distribute malware?

  • Physical destruction of hardware (correct)
  • Untrusted sites and free software
  • Fake programs
  • Removable devices
  • What is a recommended strategy when conducting social engineering attacks?

    <p>Maintain trust</p> Signup and view all the answers

    Which wireless vulnerability involves cracking WEP?

    <p>Active brute forcing of WiFi</p> Signup and view all the answers

    How do hackers often use Trojans?

    <p>To create backdoors for remote access</p> Signup and view all the answers

    What should you consider when choosing the right wireless network card?

    <p>Wireless standard supported</p> Signup and view all the answers

    Which technique could help gather information for wireless reconnaissance?

    <p>Target organization policy on remote workers</p> Signup and view all the answers

    What is a safe practice concerning email attachments?

    <p>Open attachments from known senders only</p> Signup and view all the answers

    Which technique is commonly used in active sniffing?

    <p>DNS poisoning</p> Signup and view all the answers

    Which of the following protocols are vulnerable to sniffing?

    <p>FTP</p> Signup and view all the answers

    What describes passive wiretapping?

    <p>Monitors and records the traffic</p> Signup and view all the answers

    What is an effective way to defend against password cracking?

    <p>Set the password change policy to 30 days</p> Signup and view all the answers

    Which type of privilege escalation refers to gaining higher privileges?

    <p>Vertical privilege escalation</p> Signup and view all the answers

    What does the enumeration module focus on?

    <p>User lists and security flaws</p> Signup and view all the answers

    What is the function of using HTTPS instead of HTTP?

    <p>Provide encryption of data in transit</p> Signup and view all the answers

    What is the primary purpose of a wrapper in the context of Trojans?

    <p>To bind a Trojan EXE with innocent looking applications</p> Signup and view all the answers

    Which of the following is NOT a technique to evade anti-virus detection?

    <p>Downloading Trojans from the web</p> Signup and view all the answers

    Which stage is NOT part of the virus life cycle?

    <p>Execution</p> Signup and view all the answers

    What is a common motivation behind creating viruses?

    <p>To gain financial benefit</p> Signup and view all the answers

    Which action makes a computer more vulnerable to virus infections?

    <p>Opening infected email attachments</p> Signup and view all the answers

    What is an effective method to detect Trojans?

    <p>Running a Trojan scanner to detect Trojans</p> Signup and view all the answers

    Which of the following is part of Trojan counter measures?

    <p>Installing patches and security updates</p> Signup and view all the answers

    What do most anti-virus products do regarding backdoor programs?

    <p>Scan and detect backdoor programs</p> Signup and view all the answers

    Active sniffing is used to sniff a hub-based network.

    <p>False</p> Signup and view all the answers

    Vertical privilege escalation refers to acquiring the same level of privileges that are already granted.

    <p>False</p> Signup and view all the answers

    One way to defend against password cracking is to set the password change policy to 30 days.

    <p>True</p> Signup and view all the answers

    Active wiretapping only monitors and records traffic.

    <p>False</p> Signup and view all the answers

    A wrapper associates a Trojan EXE with innocent looking applications.

    <p>True</p> Signup and view all the answers

    Software used for passive sniffing can capture email traffic.

    <p>True</p> Signup and view all the answers

    Changing Trojan syntax is an ineffective way to evade anti-virus software.

    <p>False</p> Signup and view all the answers

    Viruses can inflict harm on programs and corrupt files.

    <p>True</p> Signup and view all the answers

    Using VPNs is a recommended measure to defend against sniffing.

    <p>True</p> Signup and view all the answers

    HTTP is a secure protocol for transmitting sensitive data.

    <p>False</p> Signup and view all the answers

    Installing pirated software does not increase the risk of virus infections.

    <p>False</p> Signup and view all the answers

    Non-electronic attacks are one type of password attack.

    <p>True</p> Signup and view all the answers

    Running a Trojan scanner is an effective way to detect Trojans.

    <p>True</p> Signup and view all the answers

    Scanning CDs and DVDs with anti-virus software before use is unnecessary.

    <p>False</p> Signup and view all the answers

    The design stage is part of the virus life cycle.

    <p>True</p> Signup and view all the answers

    Financial gain is a common motivation for creating viruses.

    <p>True</p> Signup and view all the answers

    Social engineering strategies include assumptions and preparation.

    <p>True</p> Signup and view all the answers

    One of the tactics used in social engineering is to threaten the target.

    <p>False</p> Signup and view all the answers

    One method to meet the ultimate goal of spear phishing is using client-side exploits.

    <p>True</p> Signup and view all the answers

    Black hat search engines are an ineffective method for distributing malware.

    <p>False</p> Signup and view all the answers

    Cracking WPA preshared keys is one of the major wireless vulnerabilities.

    <p>True</p> Signup and view all the answers

    Trojan horses can only be used to generate fake traffic.

    <p>False</p> Signup and view all the answers

    Airodumps is a tool used for wireless reconnaissance.

    <p>True</p> Signup and view all the answers

    The ultimate goal of spear phishing is to sell user credentials to third parties.

    <p>False</p> Signup and view all the answers

    Study Notes

    Social Engineering

    • Social engineering relies on understanding, practicing, and trusting one's gut feeling to execute attacks.
    • Strategies include making assumptions, preparation, keeping it simple, avoiding detection, and not lying.
    • Tactics include mimicking desired characteristics, like "like likes like," and targeting personality types, such as being friendly.
    • Other tactics include using inside information, employing name-dropping, and using authority, supplications, sympathy, sex appeal, and greed to persuade or manipulate.
    • Two approaches for influencing someone include threatening them and enticing them.

    Spear Phishing Methods

    • Spear phishing uses various methods, including emails, phone calls, text messages, and walkie-talkies.
    • The goal is to compromise the target computer and obtain user credentials for applications.
    • Methods to achieve this include setting up phishing websites, utilizing client-side exploits, and creating custom Trojan backdoors.

    Wireless Recon

    • In wireless reconnaissance, the goal is to gather information about a target organization's remote workers.
    • Data collection may include locations such as home addresses, offices, and places they regularly visit, like luncheon places.
    • Wireless attacks typically have three phases: reconnaissance, attacking the wireless access point, and attacking wireless clients.

    Wireless Network Cards

    • Essential features to consider when selecting a wireless network card include the supported wireless standard, antenna support, connection types, and power capabilities.
    • Common wireless recon tools include Kismet, Airodumps, and Android applications.

    Malware

    • Malwares include Trojan horses, viruses, and worms.
    • Malwares may enter systems via removable devices, attachments, fake programs, and untrusted websites.
    • Malware distribution methods include using black hat search engines, spear phishing sites, and compromised legitimate websites.
    • Trojans are used to create backdoors for gaining remote access and generating false traffic to create denial-of-service (DoS) attacks.
    • Trojans can be used for recording screenshots, audio, and video on a victim's computer, downloading spyware and adware files, and for sending malicious emails.
    • Trojans also enable infections of other systems.
    • One of the methods to construct a Trojan is with a dropper and a wrapper. A wrapper binds a Trojan EXE to an innocent looking application. This wrapper combines the two programs into a single file.
    • Techniques for evading anti-virus software include dividing Trojans into multiple parts and zipping them into a single file.
    • Building your own is another important method.
    • Trojans can also be embedded into applications, and you can change the Trojan syntax using a specialized editor.
    • Avoid using Trojans downloadable from the web.

    Virus Transmission and Characteristics

    • The common transmission modes for viruses include file downloads, injected flash drives, and email attachments.
    • Viruses affect other programs, corrupt data, transform themselves, corrupt other files, encrypt themselves, and replicate.
    • Virus stages include design, propagation, launching, and detection followed by incorporation and elimination.
    • One of the reasons why people create viruses can be for financial gain, play pranks, vandalism, cyber terrorism, or for research projects.

    Virus Infection and Detection

    • Infections can happen through downloading files without verifying the source, opening infected email attachments, installing pirated software, not upgrading plugins, or not running the latest anti-virus software
    • To detect Trojans, it is possible to scan for suspicious files and folders and scan for suspicious network activities.
    • Further measures can be taken by scanning for suspicious windows services, device drivers, and running a dedicated Trojan scanner.

    Trojan, Spyware, and Keylogger Countermeasures

    • Keylogger countermeasures include using popup blockers, installing antivirus programs, setting up firewalls, deleting phishing emails, avoiding junk email, using a firewall, and disabling auditing.
    • Spyware countermeasures include using anti spyware programs and strengthening computer security levels.
    • Regular checks of the task manager and caution with suspicious emails are also beneficial.

    Sniffing

    • Sniffing data can be passive (monitoring traffic on hubs to all ports) or active (snifing a switch-based network).
    • Information obtained through sniffing includes Telnet passwords, router configurations, FTP passwords, web traffic, and email traffic.
    • Protocols vulnerable to sniffing include HTTP, Telnet, rlogin, POP, IMAP, SMTP, NNTP, and FTP.
    • Active wiretapping involves monitoring, recording, altering, and injecting into communication.
    • Passive wiretapping only monitors and records traffic.
    • To protect against sniffing, use HTTPS instead of HTTP, switches instead of hubs, SFTP instead of FTP and utilize VPNs and one-time passwords.

    Footprinting and Password Attacks

    • Footprinting modules involve identifying IP ranges, names, paces, and employees of a target organization.
    • Activities of the module include target assessment, identifying systems and services.
    • Enumeration modules involve intrusive probing, user lists, and security flaws.
    • Password attacks can be non-electronic, active online, passive online, and offline.
    • Techniques for password guessing usually start with ranking passwords from high to low probability and attempting each one until the correct one is found.

    Privilege Escalation

    • Privilege escalation can be vertical (gaining higher privileges) or horizontal (gaining the same level of privileges as existing users).
    • Defenses include using encryption, implementing multi-factor authentication, and regularly patching the system.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Cybersecurity Notes PDF

    Description

    Test your knowledge on social engineering tactics and spear phishing methods with this quiz. Explore various strategies that attackers use to manipulate individuals, including psychological tactics and technological approaches. Understand how to recognize these threats to better protect yourself and your information.

    More Like This

    Use Quizgecko on...
    Browser
    Browser