1.1 Compare and contrast different types of social engineering techniques Flashcards

1
Q

Phishing

A

Phishing is the process of manipulating a victim to disclose personal or private information. An email asking for login details from a server not under the control of the company would describe a phishing attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

Smishing, or SMS phishing, is a social engineering attack that asks for
personal information using SMS or text messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

Vishing, or voice phishing, is using voice communication for the phishing
process. This phishing attempt used an email message, so it would not be
categorized as vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spim

A

Spam over Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear phishing

A

Spear phishing is a directed attack that attempts to obtain private or
personal information. In this example, the result was to obtain payment and not to gather private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder surfing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

Whaling is phishing targeted towards individuals at a higher level of an
organization. These persons are usually in upper management or have
access to the financial operations of the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A

Prepending adds information before a domain name in an attempt to fool
the victim into visiting a website managed by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity fraud

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Credential harvesting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice scams

A
16
Q

Reconnaissance

A
17
Q

Hoax

A
18
Q

Impersonation

A
19
Q

Watering hole attack

A
20
Q

Typo squatting

A

Typosquatting is a technique that uses a misspelling of a domain name to
convince victims they are visiting a legitimate website

21
Q
A