Apprenticeship shit Flashcards

1
Q

What is phishing

A

attempting to steal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is vishing?

A

attempting to steal personal information over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is smishing?

A

attempting to steal personal information over text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is spam?

A

sending out lots of unsolicited emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is dumpster diving?

A

Going through bins or rubbish to identify personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is shoulder surfing?

A

Watching people enter personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pharming?

A

redirecting users traffic to a malicious site.
DNS cache poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tailgating?

A

Following someone into a building into a high security area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are hoaxes?

A

Creating a fake situation to get information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is prepending?

A

Adding mentions on social media posts to seem legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is impersonation

A

Pretending to be someone or something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is identity fraud

A

doing things under someone elses identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an invoice scam

A

Asking someone to pay a fraudulent invoice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is credential harvesting?

A

Gathering credentials at a large scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What s a watering hole attack?

A

Identifying a site a group use, and targeting this site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What typo squatting / url highjaking?

A

choosing a domain name that is a typo of a popular domain name

17
Q

What is hybrid warfare?

A

A combination of techniques for a campaign (cyber activities, proxy organisations)

18
Q

What are social media campaigns?

A

Campaigns that influence social media users

19
Q

What are the principles of attacks

A

Authority
Intimidation
Consensus
Familiarity
Trust
Urgency

20
Q

What is consensus

A

acting with the consensus of the larger group

21
Q

What is familiarity

A

favoring something because they know / like it

22
Q

What is trust?

A

Acting because you trust something

23
Q

What is urgency?

A

Forcing someone to act quickly and with bad jugement

24
Q

What are IOCs

A

Artifacts observerd that indicate being hacked

25
Q

What is a virus?

A

Malicious code that requires user interaction to install or replicate

26
Q

What is ransomware?

A

Malicious programs that hold an asset at ransom in exchange for another asset.

27
Q

What is a trojan

A

A malicious piece of code, inside a legitimate application. Often called a RAT

28
Q

What is a worm?

A

A self replicating peice of malicious code

29
Q

What are potentially unwanted programs?

A

An application downloaded as part of another program.

30
Q

What is a fileless virus?

A

A virus that is in memory and never written to disk

31
Q

What are botnets?

A

A large network of slave computers to a c2

32
Q

What is a logic bomb?

A

Malicous code that executes when a condition is met

33
Q

What is spyware?

A

Malicious code that captures users activity and reports back.

34
Q

What is a keylogger?

A

Malicious code that captures keystrokes

35
Q

What is a rootkit

A

Malicious kernel mods that hide at the kernel level

36
Q

What is a backdoor

A

A way to maintain persitance in after the exploitation of a vulnerability