1. This device could have electronics that could cause your OS to identify it as a HID,...
Question:
1. This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that it is connected to a keyboard or mouse.
A. USB cable
B. card shimmer
C. cloned card
D. card skimmer
2. This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that it is connected to a keyboard or mouse.
A. USB flash drive
B. card skimmer
C. cloned card
D. card shimmer
3. This is when a hacker makes a physical copy of your credit card.
A. card skimming
B. USB cable
C. card cloning
D. USB flash drive
4. Your organization recently got hacked. The organization’s NIDS (Network Intrusion Detection System) triggered an alert about suspicious network activity from some computers. The NIDS recorded that the same online game was downloaded on all these computers. The help desk recently received calls from users with these same computers. The users complained that their computer’s webcam and microphone kept being turned on and off and network access was slow. Which of the following is the MOST likely malware type?
A. RAT
B. keylogger
C. ransomware
D. worm
5. This device captures payment and personal information from a credit card holder.
A. card skimmer
B. malicious USB cable
C. cloned card
D. USB flash drive
6. A hacker’s computer tricks the user’s computer to shift from TLS to SSL. What kind of attack is this?
A. collision attack
B. downgrade attack
C. supply chain attack
D. birthday attack
7. What is an easier, quicker way to find a collision attack?
A. on-premises attack
B. downgrade attack
C. supply chain attack
D. birthday attack
8. An attacker captured a database of hashed passwords. Some passwords are single words, but other passwords are long strings of letters, characters, and symbols. What technique will crack the MOST passwords in the LEAST amount of time?
A. rainbow tables
B. dictionary attack
C. brute force attack
D. spraying
9. A hacker’s computer tricks the user’s computer to shift from 2048-bit to 512-bit RSA encryption keys. What kind of attack is this?
A. birthday attack
B. supply chain attack
C. collision attack
D. downgrade attack
10. SolarWinds unwittingly sent out software updates to its customers that included the hacked code. What kind of attack is this?
A. birthday attack
B. supply chain attack
C. adversarial AI attack
D. downgrade attack
Auditing and Assurance services an integrated approach
ISBN: 978-0132575959
14th Edition
Authors: Alvin a. arens, Randal j. elder, Mark s. Beasley