What are some of the impacts that an XSS attack could have on an organization?
Hijacking accounts
Spreading of malware
:
Which data might you find while dumpster diving?
Medical records
Phone numbers
Credit card statements
:
What are some signs that you may be under a distributed denial of service attack?
Sudden surge in requests
Slow performance
Odd web facing network traffic patterns
:
Which characteristics would make a building more susceptible to tailgating attacks?
Large number of active employees
Multiple entrances
Busy office space
:
Which are some of the typical types of social engineering attacks?
Phishing
Tailgating
Pretexting
:
Which device can you install on a monitor to help protect against shoulder surfing?
Privacy Screen
:
Which malicious actors might undertake a zero-day attack?
Nation states conducting cyber warfare
Hacktivists
Cybercriminals
:
How might an attacker fake a secure connection?
SSL hijacking
SSL striping
HTTPS spoofing
:
How can you protect yourself from a brute force attack?
Don’t reuse passwords
Use two-factor authentication
Use long complex passwords
:
How can you prevent a SQLi attack?
Scan regularly for vulnerabilities
Use strict allowlists
:
Which type of spoofing attack might an attacker attempt?
Email spoofing
Website spoofing
IP address spoofing
:
Which types of phishing attack might be undertaken by an attacker?
Spearphishing
Whaling
:
Which steps can be taken to help prevent whaling attacks?
Senior management training
Enhanced email security
Data protection software
:
Which steps would an attacker take in an evil twin attack?
Attacker lures victims into connecting to evil twin
Attacker creates a fake Captive Portal
:
How can you protect your organization from insider threats?
Monitor critical assets with video
Create a culture of security
:
When conducting an impersonation attack, who might an attack impersonate to have the best results?
Influential persons
Well-known brands
Third-party vendors






.png)