Chapter 1 Threats, Attacks, and Vulnerabilities Flashcards

1
Q

What is Social Engineering?

A

An attack against a user, and typically involves some form of social interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Phishing?

A

A type of social engineering in which an attacker attempts to obtain sensitive information from users by masquerading as a trusted entity in an email or instant message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Smishing?

A

An attack using Short Message Service (SMS) on victims cell phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Vishing?

A

A variation of phishing that uses voice communication technology to obtain the information the attacker is seeking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Spam?

A

Bulk unsolicited email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spam over Instant Messaging (SPIM)?

A

Spam delivered via an instant messaging application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Spear Phishing?

A

A phishing attack that targets a specific person or group of people with something in common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Dumpster Diving?

A

The process of going through a targets trash in hopes of finding valuable info that might be used in a penetration attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Shoulder Surfing?

A

The process of looking over the shoulder of the target while they input sensitive and private information into a form or website login etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pharming?

A

Consists of misdirecting users to fake websites made to look official

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Tailgating (piggybacking)

A

The simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Whaling?

A

Custom built attacks when the target is ahigh-value person, such as a CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Prepending?

A

The act of adding something else to the beginning of an item, In social engineering adding something like stating that they were sent by the targets boss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Identity Fraud?

A

The use of fake credentials to achieve an end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Invoice Scams?

A

Use of a fake invoice in an attempt to get a company to pay for things it has not ordered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Credential Harvesting

A

Involves the collection of credential information, such as user IDs, passwords, and so on, enabling an attacker a series of access passes to the system

17
Q

What is Reconnaissance?

A

The actions of surveying a battlefield to gain information prior to hostilities

18
Q

What is impersonation?

A

An attacker assumes a role that is recognized by the person being attacked

19
Q

What is a watering hole attack?

A

The infecting of a target website with malware

20
Q

What is typosquatting?

A

An attack form that involves capitalizing upon common typographical errors

21
Q

What is pretexting?

A

A form of social engineering in which the attacker uses a narrative to influence the victim into giving up some item of information

22
Q

What is an influence campaign?

A

The use of collected info and selective publication of material to key individuals in an attempt to alter perceptions and change peoples minds on a topic

23
Q

What is intimidation?

A

Can be either subtle, through perceived power, or more direct, through the use of communications that build an expectation of superiority

24
Q

What is a Consensus?

A

A group wide decision