BAC3305  HUMAN ASPECTS OF FORENSICS.

UNIVERSITY EXAMINATIONS: 2018/2019
EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN
APPLIED COMPUTING
BAC3305 HUMAN ASPECTS OF FORENSICS
FULL TIME/PART TIME/DISTANCE LEARNING
DATE: APRIL 2019 TIME: 2 HOURS
INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions.

QUESTION ONE [30 MARKS]
a) Identify and describe the four steps of the social engineering lifecycle (4 Marks)
b) Name at least four categories of Social Engineers? (4 Marks)
c) Social Engineering Attacks can be divided into two categories. Identify and describe each
one? (4 Marks)
d) i) What methods exist for information gathering? (2 Marks)
ii) Provide two examples for each method of information gathering identifying the method
it belongs to and explaining how the example would be carried out in a social engineering
attack. (8 Marks)
e) There is a predictable four-step sequence to social engineering attacks typically referred to as
an attack cycle. Outline the four steps describing how each step is applicable in the social
engineering attack cycle. (8 Marks)
QUESTION TWO [20 MARKS]
Cybercriminals use the same tools used by Cybersecurity professionals. As a Cyber and Social
Engineering expert, you should be familiar with some of these tools used to investigate, mitigate
and prevent attacks. Use your knowledge of Social Engineering tools to answer the following
questions:
a) i) How are Social Engineering tools categorized? (3 Marks)
ii) Provide 2 examples for each category. (6 Marks)
b) What is the Social Engineering Toolkit? (3 Marks)
c) i) Provide four prominent uses of the social engineering toolkit (4 Marks)
ii) What four methods can be used to employ a social engineering attack using the social
engineering toolkit? (4 Marks)
QUESTION THREE [20 MARKS]
An external auditor wants to enter the building without proper access rights. After days of standing
outside a secure entrance to the building, the auditor recognizes a man who often comes through
this entrance and approaches him. The auditor pretends to have left his badge on the desk and is
able to gain entry after convincing the man his badge is at his desk. With access to the building,
the auditor is then able to talk his way through various departments gaining valuable information
on the inner workings of the organization.
a) i) What category of social engineers does the auditor fall under? (2 Marks)
ii) What Social Engineering attack technique was employed by the auditor? (2 Marks)
iii) Briefly explain how the attack works. (4 Marks)
b) Identify and describe four ways to prevent and mitigate social engineering. (8 Marks)
c) What are the four factors that motivate social engineers? (4 Marks)
QUESTION FOUR [20 MARKS]
You have been tasked by the board of a large organization to test the security awareness level of
the employees of the company. The attack vector that will be used is a USB carrying malicious
software. The goal with this scenario is to get the front desk receptionist to accept your USB drive
that has the malicious program on it. The program will auto load and scrape her system for all
information, such as usernames, passwords, email accounts, SAM files that contain all the
passwords on the system, and more, copying it all to a directory on the USB drive.
Your pretext: you were attempting to drop off your CV before the deadline and on the way, you spilled
coffee all over your CV while avoiding a wreck less driver. You were dropping off your daughter to
school and didn’t have enough time to print out more copies as you were close to the office and the
deadline was approaching.
a) Using the scenario above, identify each key element of the communication module and
explain how each element would be effectively used in accomplishing the goal
(15 Marks)
b) List five sources of information gathering. (5 Marks)
QUESTION FIVE [20 MARKS]
a) When humans react to a given situation, it is possible to read and understand their actions
based on the given expressions on their face. Define and explain this action. (3 Marks)
b) A social engineer or scammer can use certain techniques to elicit information from a target
i) List six expressions that you can link with basic or biologically universal emotions of a
target. (6 Marks)
ii) What four things can help you detect deceit in a target? (4 Marks)
iii) Pick three of the expressions you listed and describe a revealing identifier that would
reveal the targets state of mind. (3 Marks)
c) Explain the concept of the Human Buffer Overflow in the context of social engineering
(4 Marks)

(Visited 80 times, 1 visits today)
Share this:

Written by