1.1 Compare and contrast different types of social engineering techniques Flashcards

1
Q

Phishing

A

An attempt to fraudulently obtain information from a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

Phishing conducted over text messages (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spam over instant messaging (SPIM)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder surfing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity fraud

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice scams

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential harvesting

A
17
Q

Reconnaissance

A
18
Q

Hoax

A
19
Q

Impersonation

A
20
Q

Watering hole attack

A
21
Q

Typosquatting

A
22
Q

Pretexting

A
23
Q

Influence campaigns
-Hybrid warfare

A
24
Q

Influence campaigns
-Socail media

A
25
Q

Principles (reasons for effectiveness)
-Authority

A
26
Q

Principles (reasons for effectiveness)
-Intimidation

A
27
Q

Principles (reasons for effectiveness)
-Consensus

A
28
Q

Principles (reasons for effectiveness)
-Scarcity

A
29
Q

Principles (reasons for effectiveness)
-Familiarity

A
30
Q

Principles (reasons for effectiveness)
-Trust

A