which of the following statements best describe Social Engineering?
Within the context of Computer Security, which of the following statements best describe Social Engineering?
What does the following command achieve?
What does the following command achieve?
Telnet <IP Address> <Port 80>
HEAD /HTTP/1.0
<Return>
<Return>
What are the six types of social engineering?
What are the six types of social engineering?(Choose six).
which of the following information sources?
Usernames, passwords, e-mail addresses, and the location of CGI scripts may be obtained from which of the following information sources?
what kind of attack?
Jack Hacker wants to break into Brown Co.’s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to tell him her password ‘just to double check our records’. Jane believes that Jack is really an administrator, and tells him her password. Jack now has a user name and password, and can access Brown Co.’s computers, to find the cookie recipe. This is an example of what kind of attack?
What kind of attack is being illustrated here?
Jack Hacker wants to break into company’s computers and obtain their secret double fudge cookie recipe. Jacks calls Jane, an accountant at company pretending to be an administrator from company. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him "just to double check our records". Jane does not suspect anything amiss, and parts with her password. Jack can now access company’s computers with a valid user name and password, to steal the cookie recipe.
What kind of attack is being illustrated here? (Choose the best answer)
What is the most common vehicle for social engineering attacks?
What is the most common vehicle for social engineering attacks?
Why is Social Engineering considered attractive by hackers and also adopted by experts in the field?
Why is Social Engineering considered attractive by hackers and also adopted by experts in the field?
Your boss at ABC.com asks you what are the three stages of Reverse Social Engineering.
Your boss at ABC.com asks you what are the three stages of Reverse Social Engineering.
Who are the primary victims of these attacks on the Internet today?
Smurf is a simple attack based on IP spoofing and broadcasts. A single packet (such as an ICMP Echo Request) is sent as a directed broadcast to a subnet on the Internet. All the machines on that subnet respond to this broadcast. By spoofing the source IP Address of the packet, all the responses will get sent to the spoofed IP Address. Thus, a hacker can often flood a victim with hundreds of responses for every request the hacker sends out.
Who are the primary victims of these attacks on the Internet today?