1.4.2 identifying data attacks Flashcards

1
Q

what is social engineering

A

when you manipulate a victim in order to gain control over a computer system or to steal personal or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

three types of social engineering

A

blagging
phishing
shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is blagging

A

on the phone and someone just gives you the personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is phishing

A

where attackers deceive people into revealing sensitive information or installing malware such as ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is shouldering

A

when a person is looking over at a persons computer in attempt to watch them type sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an acceptable use policy?

A

it is a form that people have to sign if they accept the rules that the company has on what you are allowed to do on their computers/devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is penetration testing

A

where a company get a person to use their hacking skills to try and get their information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are network forensics

A

It is where you monitor any suspicious activity that you can see on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly