Chapter 4 Flashcards

1
Q

Social Engineering

A

The practice of manipulating people through a variety of strategies to accomplish desired actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authority

A

Relies on the fact that most people will obey someone who appears to be in charge or knowledgeable, regardless of whether or not they actually are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intimidation

A

Relies on scaring or bullying an individual into taking a desired action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Consensus

A

Uses the fact that people tend to want to do what others are doing to persuade them to take an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scarcity

A

Make something look more desirable because it may the be the last one available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Familiarity

A

Based on you liking the individual or even the organization the individual is claiming to represent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trust

A

Relies on a connection with the individual they are targeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Urgency

A

Relies on creating a feeling that the action must be taken quickly due to some reason or reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

A broad term used to describe the fraudulent acquisition of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spear Phishing

A

Phishing that targets specific individuals or groups in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whaling

A

Phishing that targets senior employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Credential Harvesting

A

The process of gathering credentials like usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spam

A

Unsolicited or junk email that is used to employ various social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shoulder Surfing

A

Looking over a person’s shoulder to capture information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tailgating

A

A physical entry attack that requires simply following someone who has authorized access to an area so that they open secured doors you can pass through as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Eliciting Information

A

A technique used to gather information from targets without them realizing they are providing it.

17
Q

Pretexting

A

The process of using a made-up scenario to justify why you are approaching an individual.

18
Q

Identity Fraud

A

Using someone else’s identity.

19
Q

Brute-force Attack

A

Iterating through a list of characters or words to find a combination that works.

20
Q

Password Spraying

A

A form of brute-force attack that attempts to use a single password or small set of passwords against many accounts.

21
Q

Dictionary Attacks

A

A form of brute-force attack that uses list of words for their attempts.

22
Q
A
23
Q
A