Chapter 1.1 Flashcards

1
Q

Using deceptive communication to fool people into revealing sensitive information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A more targeted form of phishing using inside information. Usually appears to come from a known associate.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spear phishing a high value target, such as a CEO or CFO.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A lie used to gain information?

A

Pretext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adding character(s) to the beginning or end of a URL.

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unauthorized registration of a domain name.

A

Cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cybersquatting using a mistyped URL.

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Redirecting a legitimate URL to a bogus site.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing over voice mail.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing over SMS.

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Gathering information on a victim.

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pretending to be someone you are not.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evoke or draw out information from someone in reaction to one’s own action?

A

Elicit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Opening an account in someone else’s name, such as a credit card.

A

Identity Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gathering important information thrown out with the trash.

A

Dumper Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gathering information by looking at someone’s screen directly without them knowing.

A

Shoulder Surfing

17
Q

A threat that doesn’t exist but seems like it could be real.

A

Hoax

18
Q

Targeting a 3rd-party site that victims commonly visit.

A

Watering Hole Attack

19
Q

Unsolicited messages.

A

Spam

20
Q

Intentionally slowing down sever traffic by flooding it with messages.

A

Tarpitting

21
Q

Taking action to sway public opinion on political and social issues.

A

Influence Campaign

22
Q

Following an authorized person to gain access to a place.

A

Tailgating

23
Q

Sending a fake bill for a company to pay.

A

Invoice Scam

24
Q

Gathering of usernames and passwords either stored on a computer or written down.

A

Credential Harvesting or Password Harvesting

25
Q

What are the 7 social engineering principles? Hint: FAST_ICU

A

Familiarity, Authority, Scarcity, Trust, Intimidation, Consensus, Urgency