2.5 - Compare and contrast social engineering, threats, and vulnerabilities. Flashcards
1
Q
Effective social engineering.
A
2
Q
Social engineering principles.
A
3
Q
Phishing.
A
4
Q
Spear phishing.
A
5
Q
Impersonation.
A
6
Q
Shoulder surfing.
A
7
Q
Tailgating.
A
8
Q
Dumpster diving.
A
9
Q
is it legal to dive in a dumpster?
A
10
Q
Denial of service.
A
11
Q
A “friendly” DoS
A
12
Q
DDoS.
A
13
Q
Mitigating DDoS attacks
A
14
Q
Zero-day attacks.
A
15
Q
Zero-day vulnerabilities.
A