1.1 2/2 Flashcards

1
Q

prepending

A

Prepending is the act of adding extra characters to the beginning of a file or a piece of data. This can be done for various purposes, including modifying the file’s name or path, altering its metadata, or inserting a payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

identity fraud

A

s a type of crime where someone steals another person’s personal information, such as their name, date of birth, Social Security number, or financial account information, and uses it for fraudulent purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

invoice scams

A

: Invoice scams are a type of fraud where scammers send fake invoices to individuals or businesses, requesting payment for goods or services that were never ordered or provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

credential harvesting

A

Credential harvesting is the process of stealing usernames and passwords or other authentication credentials to gain unauthorized access to a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

reconnaissance

A

the process of gathering information about a target or system. In the context of cybersecurity, it can refer to the process of mapping out a target network’s architecture, identifying vulnerabilities, and gathering intelligence about potential attack vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hoax

A

A hoax is a deliberate deception or trick, typically intended to mislead or deceive people. In the context of cybersecurity, hoaxes can refer to fake security warnings or alerts designed to trick people into installing malware or disclosing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

impersonation

A

Impersonation is the act of pretending to be someone else. In the context of cybersecurity, it can refer to impersonating a legitimate user or entity to gain access to a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Watering hole attack

A

A watering hole attack is a type of cyber attack where an attacker targets a website that is likely to be visited by their intended victim, such as a popular social media platform, and infects it with malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

typosquatting

A

also known as URL hijacking, is the practice of registering domain names that are similar to popular website names or brands, but with slight misspellings, in order to deceive users into visiting a fake website or downloading malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

pretexting

A

is a social engineering technique where an attacker creates a false pretext, or story, to trick someone into disclosing sensitive information or performing an action that they would not otherwise do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Influence Campaigns - Hybrid Warfare - Social Media

A

Influence campaigns, hybrid warfare, and social media are all related concepts that involve the use of social media platforms and other online channels to manipulate public opinion, sow division, and spread propaganda. Influence campaigns and hybrid warfare can be used by state actors or other groups to achieve political or strategic goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly