Chapter 11: Denial of Service 427
- A. Appearance can easily impact the opinion that an individual or a group has about some-
one. The other options here are types of countermeasures used to stock physical attacks. - A. This type of attack is a clear example of phishing: An attacker crafts an attractive-look-
ing e-mail with the intention of enticing the victim to perform an action. - B. Training is the best and most effective method of blunting the impact of social engineering.
Addressing the problem through education can lessen the need for some countermeasures. - C. This is an example of phishing as it involves enticing the user to click on a link and pre-
sumably provide information. - C. This attack is most likely the result of identity theft, while we don’t know exactly how it
was stolen, candidates include Phishing, Social Engineering, Keyloggers, or Trojan horses. - D. This attack is called tailgating and involves a person being closely followed by another
individual through a door or entrance. - D. A vulnerability scan is designed to pick up weaknesses in a system. Such scans are typi-
cally automated. - C. A proxy is used to hide the party launching a scan.
- B. TOR is designed to hide the process of scanning as well as the origin of a scan. Addition-
ally, it can provide encryption services to hide traffic. - B. Habits are set patterns of behavior that individuals tend to follow or revert to frequently.
- B. Using keywords or buzzwords can make a victim believe the attacker is in the know
about how a company works. - C. Namedropping can be used by an attacker to make a victim believe the attacker has
power or knows people who are in power. - C. This attack is most likely a result of identity theft. The information to carry out this attack
may have been obtained through the use of techniques such as Phishing or Social Engineering,
however those techniques can be used for other attacks as well and not just identity theft.
Chapter 11: Denial of Service
- B. 0x90 is the hexadecimal value of an NOP instruction for Intel-based systems. Remember
to keep an eye out for this value; it indicates an NOP and possibly an NOP sled. - C. A successful overflow attack can change the value of an Extended Instruction Pointer
(EIP) saved on the stack. - D. Hacktivists get their title from the paradigm of hacktivism. These hackers launch attacks
against targets because they believe those targets violate the attackers’ morals, ethics, or
principles.
bapp01.indd 427 22-07-2014 10:56:36