2.5 - Compare and contrast social engineering, threats, and vulnerabilities. Flashcards
1
Q
Effective social engineering.
A

2
Q
Social engineering principles.
A

3
Q
Phishing.
A

4
Q
Spear phishing.
A

5
Q
Impersonation.
A

6
Q
Shoulder surfing.
A

7
Q
Tailgating.
A

8
Q
Dumpster diving.
A

9
Q
is it legal to dive in a dumpster?
A

10
Q
Denial of service.
A

11
Q
A “friendly” DoS
A

12
Q
DDoS.
A

13
Q
Mitigating DDoS attacks
A

14
Q
Zero-day attacks.
A

15
Q
Zero-day vulnerabilities.
A

16
Q
Man in the middle.
A

17
Q
Mitigating man in the middle.
A

18
Q
The password file.
A

19
Q
Brute force.
A

20
Q
Dictionary attacks.
A

21
Q
Rainbow tables.
A

22
Q
Spoofing.
A

23
Q
MAC Spoofing.
A

24
Q
IP address spoofing.
A

25
Q
Non-compliant systems.
A

26
Q
Protected against non-compliant systems.
A
