2.4 Common Social-Engineering Attacks, Threats, & Vulnerabilities Flashcards

1
Q

Social Engineering - Phishing

A

Imitating someone you may know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering - Vishing

A

Phishing over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering - Shoulder surfing

A

Visually looking at someone else’s device and screen by accident or intentionally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social Engineering - Whaling

A

Specifically targeting a high level personal to gain higher level information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering - Tailgating

A

Someone walking in behind someone else with access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Engineering - Impersonation

A

Pretend to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering - Dumpster diving

A

Obtaining valuable information from the trash can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering - Evil twin

A

Wireless access point with identical characteristics to fool the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threats - Distributed denial of service (DDoS)

A

Use many devices to bring down a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats - Denial of service (DoS)

A

Takes advantage of a flaw in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threats - Zero-day attack

A

Vulnerabilities that have not been identified yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threats - Spoofing

A

A person or program identifies as another by falsifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats - On-path attack

A

Attacker watches traffic to and from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threats - Brute-force attack

A

Try every possible password combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threats - Dictionary attack

A

Try every possible password combination using the words found in a dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threats - Insider threat

A

Gain access to a organization on the inside

17
Q

Threats - Structured Query Language (SQL) injection

A

Modifying one line of SQL can allow you to obtain access you shouldn’t have

18
Q

Threats - Cross-site scripting (XSS)

A

Information from one site can be shared with another

19
Q

Vulnerabilities - Non-compliant systems

A

Need to perform latest updated and configurations

20
Q

Vulnerabilities - Unpatched systems

A

Updates performs patch updates

21
Q

Vulnerabilities - Unprotected systems (missing antivirus/missing firewall)

A

Antivirus & firewalls need to be disabled when troubleshooting, but need to enable again

22
Q

Vulnerabilities - EOL OSs

A

Time when they stop selling an OS

23
Q

Vulnerabilities - Bring your own device (BYOD)

A

Personal device that needs to meet the companies security requirements