2.5 - Compare and contrast social engineering, threats, and vulnerabilities. Flashcards

1
Q

Effective social engineering.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering principles.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spear phishing.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Impersonation.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shoulder surfing.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tailgating.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster diving.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is it legal to dive in a dumpster?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of service.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A “friendly” DoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDoS.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mitigating DDoS attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero-day attacks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Zero-day vulnerabilities.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Man in the middle.

A
17
Q

Mitigating man in the middle.

A
18
Q

The password file.

A
19
Q

Brute force.

A
20
Q

Dictionary attacks.

A
21
Q

Rainbow tables.

A
22
Q

Spoofing.

A
23
Q

MAC Spoofing.

A
24
Q

IP address spoofing.

A
25
Q

Non-compliant systems.

A
26
Q

Protected against non-compliant systems.

A