1.2 Types of attacks - Social Engineering Flashcards

Compare and contrast types of attacks.

1
Q

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The fraudulent practice of sending targeted emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A highly targeted phishing attack - aimed at senior executives

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These attacks try to trick an employee into giving out confidential information via a phone call

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker walks behind a genuine authorized person to get inside the restricted access area.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack in which an adversary successfully assumes the identity of one of the legitimate parties

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Investigating a person or business’s trash to find information that can be used for Social Engineering

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of social engineering technique used to obtain information such as personal identification numbers, passwords and other confidential data by looking over the victim’s shoulder

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Emails typically arriving in chain letter fashion that often describe impossible events, highly damaging malware or urban legends.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware.

A

Watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To impersonate or imply a position of authority

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To frighten by threat

A

Intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To convince general group agreement

A

Consensus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To describe a lack of something

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To imply a closer relationship

A

Familiarity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To assure reliance on their honesty and integrity

A

Trust

17
Q

To call for immediate action

A

Urgency