1.1 Compare and contrast different types of social engineering techniques Flashcards

1
Q

Phishing

A

An attempt to fraudulently obtain information from a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

Phishing conducted over text messages (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spam over instant messaging (SPIM)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder surfing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity fraud

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice scams

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential harvesting

17
Q

Reconnaissance

19
Q

Impersonation

20
Q

Watering hole attack

21
Q

Typosquatting

22
Q

Pretexting

23
Q

Influence campaigns
-Hybrid warfare

24
Q

Influence campaigns
-Socail media

25
Q

Principles (reasons for effectiveness)
-Authority

26
Q

Principles (reasons for effectiveness)
-Intimidation

27
Q

Principles (reasons for effectiveness)
-Consensus

28
Q

Principles (reasons for effectiveness)
-Scarcity

29
Q

Principles (reasons for effectiveness)
-Familiarity

30
Q

Principles (reasons for effectiveness)
-Trust