Social Engineering Security Threats Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of attack involves overwhelming a target host with half-open TCP connections?

  • Session hijacking attack
  • Port scan attack
  • Reset attack
  • SYN flood attack (correct)
  • Which type of attack involves providing an invalid gateway to create a man-in-the-middle scenario?

  • ICMP attack
  • DNS attack
  • DHCP attack (correct)
  • HTTP or HTTPS attack
  • What error might a network administrator receive when attempting to overwrite existing Manager ACL commands?

  • ACL does not exist
  • ACL already exists (correct)
  • ACL is corrupted
  • ACL requires confirmation
  • In which direction was the standard ACL applied on interface serial 0/0/0 in the exhibit?

    <p>Outbound direction</p> Signup and view all the answers

    What type of response does the target host send during a TCP SYN flood attack?

    <p>TCP-SYN-ACK</p> Signup and view all the answers

    Which component can a cybercriminal manipulate to intercept data in a man-in-the-middle attack?

    <p>Gateway settings</p> Signup and view all the answers

    What type of security threat does the scenario of a person calling to confirm a username and password for auditing purposes represent?

    <p>Social engineering</p> Signup and view all the answers

    Why are DDoS attacks, spam, and keylogging not examples of social engineering?

    <p>They rely on exploiting human psychology</p> Signup and view all the answers

    In security attacks, how are zombies typically utilized?

    <p>Carrying out distributed denial of service (DDoS) attacks</p> Signup and view all the answers

    Which security attack technique involves threat actors intercepting and controlling communication between a source and destination?

    <p>Man-in-the-middle (MitM) attack</p> Signup and view all the answers

    What distinguishes social engineering from DDoS attacks and spam?

    <p>Relies on manipulating human behavior</p> Signup and view all the answers

    Which of the following is an example of social engineering?

    <p>Gaining passwords through personal interaction</p> Signup and view all the answers

    What is the term used to describe the same pre-shared key or secret key, known by both the sender and receiver to encrypt and decrypt data?

    <p>Symmetric encryption</p> Signup and view all the answers

    Inbound ACLs must be __________ before they are processed.

    <p>Routed</p> Signup and view all the answers

    When applying an extended ACL to an interface on a router, why would the 'ip access-group 101 in' configuration option be used?

    <p>To secure management traffic into the router</p> Signup and view all the answers

    When would a technician use the 'access-class 20' command in configuration?

    <p>To secure administrative access to the router</p> Signup and view all the answers

    In which type of attack is falsified information used to redirect users to malicious Internet sites?

    <p>DNS cache poisoning</p> Signup and view all the answers

    What is the best ACL type and placement to use when an employee's internet privileges are revoked but still needs access to company resources?

    <p>Standard ACL inbound on R1 G0/0</p> Signup and view all the answers

    What is a primary feature of an Intrusion Prevention System (IPS)?

    <p>It can stop malicious packets</p> Signup and view all the answers

    What is the implicit action of both named and numbered ACLs?

    <p>Deny all traffic</p> Signup and view all the answers

    What term is used to describe a potential danger to a company's assets, data, or network functionality?

    <p>Threat</p> Signup and view all the answers

    Which statement about ACLs is true?

    <p>Numbered ACLs permit or deny based on source IPv4 address only</p> Signup and view all the answers

    In what direction would an extended ACL typically be applied on a router interface if it needs to filter incoming traffic?

    <p>Inbound</p> Signup and view all the answers

    What is the main purpose of using ARP cache poisoning in a network attack?

    <p>Redirecting users to malicious sites</p> Signup and view all the answers

    What does a standard access list filter on?

    <p>Source IP address</p> Signup and view all the answers

    In the second scenario, which command is used to deny traffic from the 172.16.0.0/16 network?

    <p>Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0</p> Signup and view all the answers

    Which ACL command should be used to permit all other traffic in the second scenario?

    <p>Router(config)# access-list 95 permit any</p> Signup and view all the answers

    What was the intention of the ACL configured on R1 in the third scenario?

    <p>Deny all traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24</p> Signup and view all the answers

    On which interface was the standard ACL applied in the third scenario?

    <p>FastEthernet interface Fa0/0</p> Signup and view all the answers

    Which of the following commands is NOT used to specify a range of IP addresses in an ACL?

    <p>Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0</p> Signup and view all the answers

    Study Notes

    Standard Access Lists (ACLs)

    • Standard ACLs only filter on the source IP address.
    • To deny traffic from a specific network, use the access-list command with the deny keyword followed by the network address and subnet mask.
    • To permit all other traffic, use the access-list command with the permit keyword and the any keyword.

    Access List Configuration

    • When applying an ACL to an interface, the direction of the ACL is important (inbound or outbound).
    • The ACL is applied to the interface using the ip access-group command.

    Security Threats

    • TCP SYN flood attack: a cybercriminal sends a continuous flood of TCP SYN session requests to a target host, overwhelming it with half-open TCP connections.
    • Man-in-the-middle attack: a cybercriminal provides an invalid gateway to intercept data.
    • Social engineering: an attacker tries to gain the confidence of an employee to obtain sensitive information.
    • Zombies: infected machines that carry out a DDoS attack.

    ACL Types and Placement

    • Standard ACLs: permit or deny packets based on the source IPv4 address.
    • Extended ACLs: permit or deny packets based on source and destination IP addresses, ports, and protocols.
    • Placement of ACLs depends on the desired traffic control (inbound or outbound).

    Network Security

    • IPS (Intrusion Prevention System): identifies and stops malicious packets.
    • Threat: a potential danger to a company's assets, data, or network functionality.
    • Vulnerability: a weakness in a system that can be exploited by an attacker.
    • Exploit: a piece of code or a program that takes advantage of a vulnerability.

    ACL Commands

    • access-list: used to create a new ACL or add to an existing one.
    • access-class: used to secure administrative access to the router.
    • ip access-group: used to apply an ACL to an interface.
    • ip access-group in: used to apply an ACL to an interface in the inbound direction.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on security threats and identify the type of threat represented by a phone call requesting username and password verification for auditing purposes. Learn about social engineering tactics used to gain confidential information. Explore the dangers of divulging sensitive information over the phone.

    More Like This

    Use Quizgecko on...
    Browser
    Browser