Cisco-Training.net
1) Identify three techniques used in social engineering. (Choose three.)
fishing
* vishing
* phishing
spamming
* pretexting
junk mailing
2) During a pretexting event, how is a target typically contacted?
by e-mail
* by phone
in person
through another person
3) While surfing the Internet, a user notices a box claiming a prize has been
won. The user opens the box unaware that a program is being installed. An
intruder now accesses the computer and retrieves personal information. What
type of attack occurred?
worm
virus
* Trojan horse
denial of service
4) What is a major characteristic of a Worm?
malicious software that copies itself into other executable programs
tricks users into running the infected software
a set of computer instructions that lies dormant until triggered by a specific
event
* exploits vulnerabilities with the intent of propagating itself across a network
5) A flood of packets with invalid source-IP addresses requests a connection on
the network. The server busily tries to respond, resulting in valid requests being
ignored. What type of attack occurred?
Trojan horse
brute force
ping of death
* SYN flooding
6) What type of advertising is typically annoying and associated with a specific
website that is being visited?
adware
* popups
spyware
tracking cookies
Cisco-Training.net
7) What is a widely distributed approach to marketing on the Internet that
advertises to as many individual users as possible via IM or e-mail?
brute force
* spam
spyware
tracking cookies
8) What part of the security policy states what applications and usages are
permitted or denied?
identification and authentication
remote access
* acceptable use
incident handling
9) Which statement is true regarding anti-virus software?
Only e-mail programs need to be protected.
Only hard drives can be protected.
* Only after a virus is known can an anti-virus update be created for it.
Only computers with a direct Internet connection need it.
1