Attacks, Threats, and Vulnerabilities Flashcards
1
Q
Phishing
A
2
Q
Smishing
A
3
Q
Vishing
A
4
Q
Spam
A
5
Q
Spim
A
6
Q
Spear phishing
A
7
Q
Dumpster diving
A
8
Q
Shoulder surfing
A
9
Q
Pharming
A
10
Q
Tailgating
A
11
Q
Eliciting information
A
12
Q
Whaling
A
13
Q
Prepending
A
14
Q
Identity fraud
A
15
Q
Invoice scams
A
16
Q
Credential harvesting
A
17
Q
Reconnaissance
A
18
Q
Hoax
A
19
Q
Impersonation
A
20
Q
Watering hole attack
A
21
Q
Typosquatting
A
22
Q
Pretexting
A
23
Q
Influence campaign
A
24
Q
Hybrid warfare
A
25
Q
Authority
A
26
Q
Intimidation
A
27
Q
Consensus
A
28
Q
Scarcity
A
29
Q
Familiarity
A
30
Q
Trust
A
31
Q
Urgency
A
32
Q
Ransomware
A
33
Q
Trojans
A
34
Q
Worms
A
35
Q
PUPs
A
36
Q
Fileless virus
A
37
Q
Command and control
A
38
Q
Bots
A
39
Q
Cryptomalware
A
40
Q
Logic bombs
A
41
Q
Spyware
A
42
Q
Keyloggers
A
43
Q
RAT
A
44
Q
Rootkit
A
45
Q
Backdoor
A
46
Q
Spraying (password attack)
A
47
Q
Dictionary (password attack)
A
48
Q
Brute Force (password attack)
A
49
Q
Rainbow table (password attack)
A
50
Q
Plaintext/Unencrypted (password attack)
A
51
Q
Malicious USB cable
A
52
Q
Malicious flash drive
A
53
Q
Card cloning
A