Social Engineering pt.1
Social Engineering pt.2
100


What is a denial of service (DoS) attack?

A denial of service attack is an attempt to force a service to fail or become unavailable to its intended users.

100

What is VLAN hopping, and what are its primary methods?

VLAN hopping involves unauthorized access to different VLANs in a network. Its two primary methods are switch spoofing and double tagging.

200

How can a DoS attack be accomplished?

 A DoS attack can be executed by overloading the service, exploiting design failures or vulnerabilities, or causing the system to be unavailable intentionally.

200

How can spoofing be defined?

Spoofing involves pretending to be something you're not. include email address spoofing, caller ID spoofing, and MAC address spoofing.

300

What is the purpose of a smokescreen in the context of cyber-attacks?

A smokescreen in cyber attacks is used to create a distraction or cover for another exploit or malicious activity.


300

What is the purpose of hashing passwords, and why is it considered a one-way trip?

Hashing passwords converts them into fixed-length strings of text for storage. It's considered a one-way trip because it's nearly impossible to recover the original password from the hash.

400

What is the acronym SIEM stand for, and what does it involve?

SIEM stands for Security Information and Event Management. It involves logging security events and information, real-time security alerts, log aggregation, long-term storage, data correlation, and forensic analysis.


400

What is phishing, and how does it relate to social engineering?

Phishing is a type of social engineering attack where attackers attempt to deceive individuals into revealing sensitive information by impersonating a trustworthy entity, often via email or text.


500

How can botnets be utilized in cyber-attacks?

Botnets, which are groups of infected machines (bots) working together, can be used for distributed denial of service (DDoS) attacks, spam relaying, proxying network traffic, and distributed computing tasks.


500

How can network hardening help prevent security breaches?

Network hardening involves implementing security measures such as secure SNMP usage, router advertisement (RA) guard, and preventing shoulder surfing to strengthen network defenses and mitigate potential vulnerabilities.


M
e
n
u