1.1 Social Engineering Techniques Flashcards

1
Q

What is Phishing?

A

Attackers pretending to be a service provider to extract your information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Typosquatting?

A

A type of URL hijacking
https://professormessor.com
https://professormesser.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Pretexting?

A

Lying in a situation to get information
Another type of URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Pharming?

A

Redirecting a group of people to a bogus website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Vishing?

A

Phishing over a voice call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Smishing?

A

Phishing over text messages (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Reconnaissance?

A

The attacker doing research to build a solid phishing attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Spear Phishing?

A

A specific attack against an indivdual or group of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Whaling?

A

Spear phishing against the CEO or head accountant due to their access to documents and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the pretext phase?

A

Setting the trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the act of Eliciting Information?

A

Getting the victim at ease to make extracting information easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some ways an attacker can use a victims information?

A

Credit card fraud
Bank fraud
Loan fraud
Government benefits fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you protect against Vishing attacks?

A

Don’t disclose personal details
Always verify before revealing info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Dumpster Diving?

A

Gathering important details from things people throw in their trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you protect yourself from Dumpster Diving?

A

Cut documents into small pieces
Burning documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Shoulder Surfing

A

Gathering information by looking over someone’s shoulder to their PC

17
Q

How to you protect yourself from Shoulder Surfing?

A

Be aware of your surroundings
Privacy filter
Keep monitor out of sight

18
Q

What are Computer Hoaxes?

A

A threat that doesn’t actually exist

19
Q

How do you debunk a Computer Hoax?

A

Cross reference hoaxes
Spam filters

20
Q

What are Watering Hole Attacks?

A

Installing malware on a website that a group of people visit

21
Q

How do you defend against the Water Hole?

A

Defense in Depth (Layered defense)
Firewalls and IPS
Antivirus/Antimalware

22
Q

What does SPIM stand for?

A

Spam over instant messaging

23
Q

What are some examples of Spam

A

Commercial advertising
Non-commercial messages
Phishing attempts

24
Q

How does a mail gateway protect against Spam?

A

A personal spam filter can be used in the cloud or a filter on the screened subnet

25
Q

What is rDNS?

A

Reverse DNS; blocks emails where the sender’s domain does not match the IP address

26
Q

What is Tarpitting?

A

The act of intentionally slowing down the server to increase time between sent and received messages

27
Q

What is Recipient Filtering?

A

Blocking all emails not addressed to a valid recipient email address

28
Q

What is Hybrid Warfare also known as?

A

Cyber warfare

29
Q

How can Hybrid Warfare be utilized?

A

Changing the thinking of another country

30
Q

What is Tailgating?

A

Unathorized personnel gaining access to a building by closely following someone else

31
Q

How can we prevent tailgating?

A

Mantraps
Visitor policy
One scan, one person

32
Q

What are Invoice Scams?

A

Spear phishing
A fake invoice is sent

33
Q

What is Credential Harvesting?

A

Attackers attempting to gain usernames and passwords stored on a local computer or browser

34
Q

What are the components of Social Engineering?

A

Being involved in organizations
Posing as an “aggressive customer”
Posing with authority
Social proof
Scarcity/Urgency
Familiarity
Trust