1.1 Flashcards

1
Q

What is an attack characterized by the attacker trying to get the victim to click on a link or log-in to an illegitimate website?

A

PhishingPhishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an attack characterized by the attacker trying to exploit the victim via text message?

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an attack characterized by the attacker trying to exploit the victim via a phone call or What is an attack characterized by the attacker trying to exploit the victim via a phone call or voicemail??

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack that is focused on a large group rather than an individual within the group

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack that is characterized by creating a false URL that is almost identical to a legitimate URL, except it has an extra letter in the beginningPrepending

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of the attacker gathering information about the victim

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack that is characterized by creating a fake URL that is very similar to a legitimate URL, except it has an easy-to-miss misspelling.

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack that involves setting up the scenario by lying to the victim

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____________ is a common causation of a pharming attack.

A

Poisoned DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Poisoned DNS server

A

Caller ID Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A targeted attack with inside information that makes the attacker more believable.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack characterized by the attacker faking to be someone they aren’t.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of an attacker extracting information from the victim.

A

Eliciting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack where the victim’s identity has been exploited.

A

Identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 types of identity fraud

A

Credit card fraud
Bank fraud
Loan fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack characterized by the attacker gaining information about the victim by going through their trash.

A

Dumpster diving

17
Q

An attack characterized by the attacker gaining information by looking at the victim’s computer screen without the victim’s knowledge.

A

Shoulder surfing

18
Q

A threat that seems real, but isn’t real.

A

Hoax

19
Q

A third party location or website that attackers exploit in hopes that their target victims will use the location/website and become infected.

A

Watering Hole Attack

20
Q

Unsolicited messages that likely could infect a user if interacted with.

A

Spam

21
Q

Spam that is received through a messaging platform.

A

Spam over instant messaging (SPIM)

22
Q

The Influence Process

A

Fake users create content > post to social media > amplify the message > real users see and share the message > Mass media picks up the story and spreads it everywhere

23
Q

A type of influence campaign that involves changing the way other people think through technology (i.e. cyberwarfare)

A

Hybrid Warfare

24
Q

When an unauthorized individual enters a secure area by following someone through a secured door.

A

Tailgating

25
Q

An attack where the attacker focuses on the individual that handles financial transactions.

A

Invoice scams

26
Q

An attack that involves the attacker attempting to access the victim’s login information via. the computer’s storage system.

A

Credential harvesting

27
Q

An attack where the attacker specifically targets an important individual that has access to a lot of important information.

A

Whaling

28
Q

The role of authority in social engineering.

A

The attacker pretends to be someone important to pressure the victim into giving up important information.

29
Q

The role of intimidation in social engineering.

A

The attacker threatens the victim in order to gain access to important information.

30
Q

The role of consensus in social engineering.

A

The attacker tries to convince the victim that what they are requesting is normal/no big deal.

31
Q

The role of scarcity & urgency in social engineering.

A

The attacker indicates that the information must be given or the change must be made before it’s too late.

32
Q

The role of familiarity & trust in social engineering.

A

The attacker tries to be friendly with the victim to the point where the victim trusts them.