adplus-dvertising
frame-decoration

Question

Megan wants to clone an ID badge for the company that she is performing a penetration test against. Which of the following types of badge can be cloned without even touching it?

a.

Magstripe

b.

Smartcard

c.

RFID

d.

CAC

Answer: (c).RFID Explanation:RFID badges are wireless and can sometimes be cloned from distances up to a few feet away. Magstripe cards need to be read with a magnetic stripe reader, smartcards provide additional security that makes them difficult to clone, and CAC cards are the U.S. government’s smartcard implementation.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Megan wants to clone an ID badge for the company that she is performing a penetration test against. Which of the following types of badge can be cloned without even touching it?

Similar Questions

Discover Related MCQs

Q. Which social engineering motivation technique relies on persuading the target that other people have behaved similarly and thus that they could too?

Q. Cameron sends a phishing email to all of the administrative assistants in a company. What type of phishing attack is he conducting?

Q. Emily wants to gather information about an organization but does not want to enter the building. What physical data gathering technique can she use to potentially gather business documents without entering the building?

Q. Frank receives a message to his cell phone from a phone number that appears to be from the IRS. When he answers, the caller tells him that he has past due taxes and is in legal trouble. What type of social engineering attack has Frank encountered?

Q. Chris sends a phishing email specifically to Susan, the CEO at his target company. What type of phishing attack is he conducting?

Q. Jen has been contracted to perform a penetration test against Flamingo, Inc. As part of her penetration test, she has been asked to conduct a phishing campaign and to use the results of that campaign to gain access to Flamingo systems and networks. The scope of the penetration test does not include a physical penetration test, so Jen must work entirely remotely.
After attempting to lure employees at Flamingo, Inc., to fall for a phishing campaign, Jen finds that she hasn’t acquired any useful credentials. She decides to try a USB key drop. Which of the following Social-Engineer Toolkit modules should she select to help her succeed?

Q. Jen has been contracted to perform a penetration test against Flamingo, Inc. As part of her penetration test, she has been asked to conduct a phishing campaign and to use the results of that campaign to gain access to Flamingo systems and networks. The scope of the penetration test does not include a physical penetration test, so Jen must work entirely remotely.
Jen wants to deploy a malicious website as part of her penetration testing attempt so that she can exploit browsers belonging to employees. What framework is best suited to this?

Q. Jen has been contracted to perform a penetration test against Flamingo, Inc. As part of her penetration test, she has been asked to conduct a phishing campaign and to use the results of that campaign to gain access to Flamingo systems and networks. The scope of the penetration test does not include a physical penetration test, so Jen must work entirely remotely.
Jen wants to send a phishing message to employees at the company. She wants to learn the user IDs of various targets in the company and decides to call them using a spoofed VoIP phone number similar to those used inside the company. Once she reaches her targets, she pretends to be an administrative assistant working with one of Flamingo’s senior executives and asks her targets for their email account information. What type of social engineering is this?

Q. Which of the following technologies is most resistant to badge cloning attacks if implemented properly?

Q. Mike wants to enter an organization’s high-security data center. Which of the following techniques is most likely to stop his tailgating attempt?

Q. Cynthia wants to use a phishing attack to acquire credentials belonging to the senior leadership of her target. What type of phishing attack should she use?

Q. What do vishing, smishing, whaling, and spear phishing have in common?

Q. What do toolkits like the Social Engineering Toolkit (SET) and the Browser Exploitation Framework (BeEF) leverage in penetration testing?

Q. What are some common motivating factors relied upon in social engineering?

Q. What is social engineering in the context of penetration testing?

Q. What is one technique for gaining physical access to facilities in penetration testing?

Q. What advantage does physical access provide in penetration testing that isn't available in remote network-based assessments?

Q. What is the purpose of caller ID and VoIP call spoofing tools in penetration testing?

Q. What does BeEF allow penetration testers to do inside a hooked browser?

Q. What information does BeEF provide about the connected browser?