1.4 Social Engineering Attacks Flashcards

1
Q

Linda’s organization recently experienced a social engineering attack.
The attacker called a help desk employee and persuaded her that she was a project manager on a tight deadline and locked out of her account.
The help desk technician provided the attacker with access to the account.
What social engineering principle was used?

  • Social Proof
  • Authority
  • Urgency
  • Scarcity
A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what type of social engineering attack does the attacker physically observe the victim’s activity?

  • Shoulder Surfing
  • Tailgating
  • Dumpster Diving
  • Phishing
A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of website does the attacker use when waging a watering hole attack?

  • Software distribution site
  • Site trusted by the end user
  • Hacker forum
  • Known malicious site
A

Site trusted by the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In what technique do attackers pose as their victim to elicit information from third parties?

  • Spoofing
  • Pretexting
  • Skimming
  • Phishing
A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of phishing attack focuses specifically on senior executives of a targeted organization?

  • Pharming
  • Spear Phishing
  • Vishing
  • Whaling
A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly