1.2 A Pre-Reading Flashcards

1
Q

What is Social Engineering?

A

Social Engineering is the manipulation of individuals into divulging confidential information or performing actions that compromise security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does social engineering work?

A

It exploits human psychology, such as trust, fear, urgency, or curiosity, rather than technical hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of social engineering?

A

To trick individuals into revealing sensitive information, installing malware, or bypassing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Phishing?

A

A technique where attackers send fraudulent emails or messages to trick users into revealing login credentials, financial information, or downloading malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Spear Phishing?

A

A highly targeted phishing attack customized to deceive a specific person or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Pretexting?

A

A form of social engineering where the attacker fabricates a scenario to obtain confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Baiting?

A

A social engineering attack where an attacker lures victims into downloading malicious software or revealing information by offering something enticing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Quid Pro Quo?

A

A scam where attackers offer a service or benefit in exchange for sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Tailgating (or Piggybacking)?

A

Gaining unauthorized physical access by following an authorized person into a restricted area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Vishing (Voice Phishing)?

A

A phone-based scam where attackers impersonate legitimate entities to extract sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Smishing (SMS Phishing)?

A

Using fraudulent text messages to deceive victims into clicking malicious links or providing confidential details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you identify phishing emails?

A

Look for suspicious sender addresses, generic greetings, urgent requests, unexpected attachments, and grammatical errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the best way to prevent falling for pretexting attacks?

A

Always verify the identity of the requester before sharing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can companies prevent tailgating attacks?

A

Implement strict access control measures, such as security badges and turnstiles, and encourage employees to challenge unknown individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is multi-factor authentication (MFA) important in social engineering defense?

A

It adds an extra layer of security, making it harder for attackers to gain access even if they obtain login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can users protect themselves from vishing and smishing attacks?

A

Never provide sensitive information over the phone or SMS unless you have verified the source through official channels.

17
Q

What should you do if you suspect a social engineering attempt?

A

Do not engage, report it to your IT department, and educate others about the attack.

18
Q

How can organizations reduce the risk of social engineering?

A

Conduct security awareness training, use strong authentication, and establish clear policies for handling sensitive data.