61. Spear phishing occurs when the attacker hopes to convince the target to initiate the contact.
a. True
b. False
62. Which attacks represent examples of state-sponsored malware?
Melissa, Shamoon, and Operation Night Dragon
“Jester” and Melissa
Stuxnet, Duqu, and Flame
Slammer, Code Red, and Melissa
63. What are the four steps that make up the policy life cycle?
Plan, implement, monitor, and evaluate
Define, detail, execute, and monitor
Identify, isolate, destroy, and document
Define, implement, manufacture, and monitor
64. Which statement describes why social engineering is successful?
People tend to forgo personal egos to better an organization.
People have a basic desire to withhold information for personal gain.
People have a basic desire to be helpful.
People with a higher status may be coerced into providing information to those of lower status.
65. Which term describes a type of phishing where individuals who are high up in an organization such as the corporate officers are targeted?
Whaling
Pharming
DNS poisoning
Vishing