2.2.2, 2.2.3, 5.6.2 Flashcards

1
Q

What is social engineering?

A

A form of psychological manipulation to gain access to sensitive information or perform unauthorized actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a method through which social engineering can be executed?

A

Texting, face-to-face communication, email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are biases in the context of social engineering?

A

Preconceived notions that influence decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which principle of social engineering exploits a bias of obedience and compliance?

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of scarcity in social engineering?

A

The desire to be exclusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can individuals defend against social engineering attacks?

A

By recognizing when manipulation techniques are being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a clue to a potential social engineering attack in email communication?

A

“Take your time to consider”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main reason social engineering attacks succeed?

A

Exploitation of human biases and emotions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following best describes phishing?

A

Attempting to gain sensitive information through electronic communication by posing as a trustworthy source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a common characteristic of obvious phishing attempts?

A

Misspelled words and odd graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is another term for phishing done by phone call or voice message?

A

Voice phishing or vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary goal of eliciting information in phishing attacks?

A

To gather personal information from the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spear phishing?

A

Phishing attempts directed at a specific target using personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term refers to spam sent over instant messaging apps?

A

Spam over Internet Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is whaling in the context of phishing?

A

Phishing attempts directed at high-profile targets like CEOs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is clone phishing?

A

Creating a duplicate email with malicious content

17
Q

What is one of the key objectives of engaging sessions for security awareness training?

A

Developing a keen eye for abnormal behaviors

18
Q

How can organizations promote continuous learning in security practices?

A

Through regular interactive training sessions

19
Q

What is one way to integrate insider threat awareness into training programs?

A

Implementing sophisticated monitoring mechanisms

20
Q

How can organizations encourage strong password management practices?

A

By equipping employees with the knowledge and skills to create and maintain secure passwords

21
Q

What is the purpose of conducting simulated phishing campaigns?

A

To serve as educational tools for employees

22
Q

How can organizations adapt security practices for remote work environments?

A

By providing guidelines for securing home offices and remote connections

23
Q

What is the purpose of setting up effective mechanisms for reporting and monitoring security incidents?

A

To ensure swift and accurate reporting of security concerns

24
Q

How can organizations integrate security training throughout the employee lifecycle?

A

By integrating comprehensive security training during onboarding and regular sessions

25
Q

What contributes to creating a resilient security environment within organizations?

A

Clear policies and proactive monitoring

26
Q

How can organizations foster a culture of security consciousness among employees?

A

By promoting continuous education and clear policies