1.1 1/3 Flashcards

1
Q

phishing

A

a type of cyver attack in which an attacker sends a fradulent email or message to avictim digsuised as a legetimate communication from a trusted source with the intention of tricking the victim into giving up sensitive information such as login credentials or financial data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

A type of phishing attack that takes place over SMS text message, in which the attacker sends a fraudulent message to the victim, usually with a link or phone number to call, in an attempt to obtain sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

A type of phishing attack that takes place over the phone, in which the attacker calls the victim, usually pretending to be from a legitimate source, such as a bank, and attempts to obtain sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

Unsolicited commercial messages sent through email or other messaging platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spear phishing:

A

: A type of phishing attack that is specifically targeted at a particular individual or group of individuals, usually with the goal of stealing sensitive information or credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dumpster diving

A

A physical method of gathering information in which an attacker searches through the trash or recycling bins of a target organization, looking for sensitive or valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shoulder Surfing

A

A physical method of gathering information in which an attacker looks over the shoulder of a victim who is entering sensitive information, such as a password, into a computer or other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spim

A

Unsolicited commercial messages sent through instant messaging or other real-time communication platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

pharming

A

A type of cyber attack that redirects victims to a fraudulent website, often through the manipulation of the Domain Name System (DNS), in an attempt to steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

tailgating

A

A physical security breach in which an unauthorized person follows an authorized person into a secure location, such as a building or room, without proper identification or clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

eliciting information

A

The act of obtaining sensitive or confidential information through the use of social engineering techniques, such as pretexting or manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

A type of spear phishing attack that targets high-level executives or other individuals with access to sensitive information, in an attempt to steal confidential data or credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly