1.2 Flashcards

1
Q

What type of attack is known as social engineering with a touch of spoofing? An example would be an e-mail from a Nigerian prince who wants to give you some of his inheritance.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing done over the phone known as?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of attack is a narrowed down version of phishing?

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack focuses on high-value targets such as a CEO?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is known as a threat that is believed to exist, but actually doesn’t?

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of attacks focuses on a common site that is visited by their target, infects the site, and in return, will eventually infect the user?

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly