WhatsApp Image 2024-12-26 at 08.08.08.jpeg

Full Transcript

# Matching Matrix Questions: Social Engineering | # | Description | Concept | |---|---|---| | 17 | Following someone into a secure area without their knowledge | A. Social Engineering | | 18 | Redirecting a user to a fake website via DNS spoofing | B. Reconnaissance | | 19 | Manipulating people to...

# Matching Matrix Questions: Social Engineering | # | Description | Concept | |---|---|---| | 17 | Following someone into a secure area without their knowledge | A. Social Engineering | | 18 | Redirecting a user to a fake website via DNS spoofing | B. Reconnaissance | | 19 | Manipulating people to gain unauthorized access or information | C. Familiarity Principle | | 20 | Gathering information before launching an attack | D. Pretexting | | 21 | Phishing attack using SMS/text messages | E. Tailgating | | 22 | Gaining access to a secure area with the consent of an employee | F. Piggybacking | | 23 | Creating a fabricated scenario to gain trust | G. SMiShing | | 24 | Making the target feel comfortable or liked | H. Pharming | # Matching Matrix Questions: Malware and AAA | # | Description | Concept | |---|---|---| | 25 | Malware that propagates over network links and consumes bandwidth | A. Trojan | | 26 | Logs all local activity on a device, including screenshots | B. Virus | | 27 | Allows a user to authenticate once and gain access to multiple systems | C. Worm | | 28 | Method of trying all possible combinations to guess a password | D. Spyware | | 29 | A knowledge-based authentication factor (e.g., password) | E. Accounting | | 30 | Malware that spreads within code without authorization | F. Something You Know | | 31 | Malware concealed within a legitimate program | G. Single Sign-On (SSO) | | 32 | Auditing the usage of an account | H. Brute Force Attack |

Use Quizgecko on...
Browser
Browser