Telecommunication and Information Technology > QUESTIONS & ANSWERS > University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Lab 6 Assessmen (All)

University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Lab 6 Assessment Quiz. 20 Q&A

Document Content and Description Below

• Question 1 5.50000 out of 5.50000 points An organization can guard against social engineering and reverse social engineering: s: by discouraging inter-organizational cooperation. by balan... cing what is acceptable and what is not acceptable. by clearly defining IT responsibilities. through awareness training. • Question 2 5.25000 out of 5.25000 points In the lab, the first step in the reconnaissance mission was to: s: use technical methods to gather preliminary information about the target, conduct an Internet search to find the correct target company. gather information about social engineering attacks. attack the target company’s home page. • Question 3 5.25000 out of 5.25000 points It is often said in the security community that to be the best __________, one must be the best attacker. s: administrat or hacker defender social engineer • Question 4 5.25000 out of 5.25000 points Most companies will list the company address and phone number on the __________ page of the Web site. s: Further Information Contact Us Our Story About • Question 5 5.25000 out of 5.25000 points Non-targeted, non-specific attacks are referred to as: s: attacks of convenience. class attacks. random attacks. variable attacks. • Question 6 5.25000 out of 5.25000 points Sites such as whois.net that are common sources of information are considered: s: Web site research tools. Internet search engines. social engineering resources. domain name registration services. • Question 7 5.25000 out of 5.25000 points The Security and Exchange Commission’s 10K report and Annual Report to Stock Holders is a(n): s: government-sponsored source of information about most U.S. companies. information resource provided by the nation’s largest search engines. open source of information about publicly-traded companies. fictitious business networking and social engineering tool. • Question 8 5.25000 out of 5.25000 points What are Global Enterprises Domain Name Servers? s: A.NS.INETSEARCH.COM and B.NS.INETSEARCH.COM A.NS.WEBSEARCH.COM and B.NS.WEBSEARCH.COM A.NS.GLOBAL.COM and B.NS.GLOBAL.COM A.NS.GLOBALENTERPRISES.COM and B.NS.GLOBALENTERPRISES.COM • Question 9 5.25000 out of 5.25000 points What firewall does Global Enterprises use? s: Windows Firewall WebWall xyzWall pfSense • Question 10 5.25000 out of 5.25000 points What is the difference between social engineering and reverse social engineering? s: Social engineering is used in the real world and reverse social engineering is used in the cyber world. Social engineering is used on the majority of people and reverse social engineering is used on people with specialized law enforcement training. With social engineering, the con artist goes to the target, while with reverse social engineering, the con artist gets the target to come to them. With social engineering, e-mail is taken from the subject, while with reverse social engineering, the subject is sent e-mail or SPAM. • Question 11 5.25000 out of 5.25000 points What version of the firewall did Global Enterprises install? s: Version 1.0 Version 2.0 Version 2.5 Version 2.1.5 • Question 12 5.25000 out of 5.25000 points Where did LouAnne Garfinkle work before coming to Global Enterprises? s: Rugs-R-Us Home Goods Rich’s Department Stores GetConnected • Question 13 5.25000 out of 5.25000 points Which Global Enterprises employee used to work for the Los Angeles Police Department? s: Ann Lawrence Steve Burns Heath Andreeson Brian Smythe • Question 14 5.25000 out of 5.25000 points Which e-mail server does Global Enterprises use? s: Connect Courier Collabora tor Retriever • Question 15 5.25000 out of 5.25000 points Which of the following statements is true regarding LouAnne Garfinkle’s blog? s: The blog proved to be a dead end as far as open source intelligence. She included details of software problems she has had and how many problems were fixed. She did not include lists of user group meetings and conferences she plans on attending. She declined to include lists of user group meetings at which she will be speaking. • Question 16 5.25000 out of 5.25000 points Which of the following statements is true regarding social engineering? s: At the most basic level, social engineering is a fancy term for a con job. The goal of the social engineer is to create a set of “facts” that are unbelievable to the subject. In most cases, targeting a single person is all that is needed to collect all the facts. The subject of a social engineering attack is often called the bulls-eye. • Question 17 5.25000 out of 5.25000 points Which of the following statements is true regarding targeted attacks? s: Targeted attacks do not attack an entire class of targets. Targeted attacks are decreasing in popularity and frequency. Attackers get smaller pay-offs in targeted attacks because they are attacking fewer targets. Targeted attacks often couple real-world crime or terrorism with cybercrime and cyberterrorism. • Question 18 5.25000 out of 5.25000 points Which of the following statements is true regarding the job ad used to lure LouAnne Garfinkle? s: It was general in nature and would have appealed to most anyone in the IT industry. It was general in nature and would have appealed to most anyone at Global Enterprises. It was specifically designed to appeal to LouAnne Garfinkle. It was ineffective at luring LouAnne Garfinkle into the ruse. • Question 19 5.25000 out of 5.25000 points Which of the following statements is true regarding today’s attack methods? s: Methods such as determining IP address ranges and performing port and vulnerability scans are considered socially engineered attack methods. Attacks rarely blend social engineering with technical means for complicated and sophisticated attacks. Senior criminals or terrorist leaders often coordinate the efforts of specialists, paying each for their services. Over time, there is less and less resemblance between cyber criminality and traditional criminal enterprises. [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$8.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
89
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 09, 2022

Number of pages

5

Written in

Seller


seller-icon
Kirsch

Member since 4 years

905 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 09, 2022

Downloads

 0

Views

 89

Document Keyword Tags

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·