4 Social Engineering and Password Attacks Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Techniques used to manipulate individuals into divulging confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three techniques related to phishing.

A
  • Smishing
  • Vishing
  • Spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of misinformation and disinformation campaigns?

A

To change opinions and shift narratives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is pretexting in the context of social engineering?

A

Using impersonation to provide a believable reason for a request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are business email compromise and brand impersonation?

A

Techniques used to make malicious communications appear legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a watering hole attack?

A

Attacks that focus on sites frequently visited by the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define typosquatting.

A

Exploiting users’ typing errors when entering URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can passwords be acquired?

A

Through online attacks against live systems or offline using captured password stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are brute-force attacks?

A

Attacks that attempt to recover passwords using methods like spraying and dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What makes password attacks easier for attackers?

A
  • Unencrypted or plain-text passwords
  • Improper or unsecure storage methods like MD5 hashes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Password cracking can only be performed online.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: Phishing techniques include _______.

A

[smishing and vishing]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the goal of malicious actors using impersonation?

A

To acquire information, gain access or credentials, or persuade individuals to take action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly