1.4 Social Engineering Attacks Flashcards
Linda’s organization recently experienced a social engineering attack.
The attacker called a help desk employee and persuaded her that she was a project manager on a tight deadline and locked out of her account.
The help desk technician provided the attacker with access to the account.
What social engineering principle was used?
- Social Proof
- Authority
- Urgency
- Scarcity
Urgency
In what type of social engineering attack does the attacker physically observe the victim’s activity?
- Shoulder Surfing
- Tailgating
- Dumpster Diving
- Phishing
Shoulder Surfing
What type of website does the attacker use when waging a watering hole attack?
- Software distribution site
- Site trusted by the end user
- Hacker forum
- Known malicious site
Site trusted by the end user
In what technique do attackers pose as their victim to elicit information from third parties?
- Spoofing
- Pretexting
- Skimming
- Phishing
Pretexting
What type of phishing attack focuses specifically on senior executives of a targeted organization?
- Pharming
- Spear Phishing
- Vishing
- Whaling
Whaling