CompTIA Security+: Social Engineering Techniques & Other Attack Types Flashcards

1
Q

What is Phishing?

A
  • Cyber attack that uses disguised email as a vector - Goal is to trick recipient into believing that the message is legit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What s one of the most common exploits vectors?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4different types of Phishing?

A

1) Spear phishing 2) Whaling 3) Vishing 4) Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is spear phishing?

A

Targets certain employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is whaling?

A

Targets high level employees or senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is vishing?

A

Targets cell phones, telephones, or VoIP systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is smishing?

A

Uses SMS texting as the attach vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are common phishing indicators?

A

1) Vague salutations 2) Suspicious domains 3) URL Paths 4) Wrong hypertext 5) Awkward grammar 6) Urgency in text (“you must act immediately”) 7) Lack of contact info 8) Spoofed headers/logos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Business Email Compromise (BEC)?

A
  • Form of attack that targets companies who outsource, conduct wire transfers, and have suppliers abroad
  • Corporate email accounts of high level employees are either spoofed or compromised through keyloggers or phishing attacks, often to perform fraud transfers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common BEC Schemes

A

1) Phony invoices or transfers 2) C-Suite (C-Team) fraud 3) Email or webmail account compromise 4) Attorney impersonation or hoaxing 5) Data theft of personal identifiable information (PII) or other personal information (health)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is pharming?

A

A blending of “phishing” and “farming” - A site’s traffic is manipulated or spoofed and confidential info is stolen - Attackers may install a virus or trojan on target that changes the computer’s host file to direct traffic away from its intended target and toward a fake web site - Crackers may also poison a DNS server to re-direct multiple users to unintentionally go to the fake site, which in turn can be used to install malware on the victim’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spam?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common categories for spam?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spim?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is typosquatting?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is tailgating/piggybacking?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is dumpster diving?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is shoulder surfing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a watering hole?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the process for scams and fraud?

A

1) Impersonation is attempted remotely through IP soofing
2) The next vecotrs use phones, email, SMS, and IM
3) The next level involves masquerading as a legitimate entity
4) The goal is typically theft of financials, IP, PII, or PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are scams and fraud?

A

Attackers go through great lengths to conduct their advance persistent threat against your organization including long-term hoaxes and scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What types of scams and fraud are there?

A
  • Elicit information and reconnaissance
  • Hoaxing
  • Identity fraid
  • Impersonation and pretending
  • Invoice scams
  • Credential harvesting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How should employees react to hoaxes and masquerading?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are influence campaigns?

A

These campaigns are also called misinformation operations and influencer operations

Goal is in red

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Wht are the 6 reasons for Social Engineering Effectiveness? (Why is it so effective)

A
  1. Lack of proper security and awareness training
  2. Inadequate acceptable use policy (AUP)
  3. No buy-in from management and employees for prevention measures
  4. No enforcement of policies
  5. Outdated anti-vrus, DLP, and mobile device and application management tools
  6. Poor perimeter security controls for email,message, telephony, and web activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Common Malware Attacks

A

All malware are exploits but not all exploits involve malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are Potentially Unwanted Programs?

A

Unwanted programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is ransomware?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the steps of a ransomware campaign?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a trojan?

A
31
Q

What do trojans do?

A

Install back doors to disguise themselves as…

32
Q

What are Remote Access Trojans (RATs)?

A

Specific forms of troan horse malware. Often part of multi-staged exports.

33
Q

Example of a RAT attack

A
34
Q

What is a worm?

A
35
Q

What is special about worms?

A
36
Q

What can be affected by a worm?

A
37
Q

What is spyware/adware?

A
38
Q

What is keylogging?

A
39
Q

What are Complex Malware Types?

A
40
Q

What is a rootkit?

A

Category where the goal is to advance administative level over a system. Can be difficult to detect

41
Q

What is the process for a backdoor?

A

1) Get access through the backdoor
2) Establish session
3) Compromise machine

42
Q

What is a backdoor?

A
43
Q

What are some backdoor exploits?

A
44
Q

What are fileless viruses?

A
45
Q

What is unique about fileless viruses?

A
46
Q

What are bots and botnets (DDos)

A
47
Q

What is the botnet process?

A

1) Bot affects host through varying attack vectors
2) Once host is infected, bot sends instructions (infiltrated data, etc.)

48
Q

What is crypto malware?

A
49
Q

What is the crypto malware process?

A
50
Q

What is a logic bomb?

A
51
Q

What is stegomalware?

A
52
Q

What are polymorphic packers?

A
53
Q

What are Multipartite Viruses?

A
54
Q

What are password attacks?

A
55
Q

What is password spraying?

A
56
Q

What are rainbow tables?

A
57
Q

How do rainbow tables attack work?

A
58
Q

What are Malicious USB Cables?

A
59
Q

How do Malicious USB Cables work?

A
60
Q

What is skimming and card cloning?

A
61
Q

How does skimming work?

A
62
Q

What is Adversarial Artificial Intelligence?

A

A technique employed in the field of artificial intelligence which attempts to fool models through malicious input

63
Q

What are types of adversarial artificial intellignece?

A
64
Q

What is a supply chain attack?

A

Also called a value-chain or third part atack

65
Q

Facts about Supply Chain Attacks

A
66
Q

Supply Chain Attack Example

A
67
Q

Cloud-based data Solution vs. On Premise

A
68
Q

What are cryptographic attacks?

A
69
Q

History of Cryptographic Attacks

A
70
Q

What are different types of cryptographic attacks?

A
  1. Birthday attacks
  2. Known plaintext attacks
  3. Cipher-text only attacks
71
Q

What is a birthday attack? (cryptographic)

A
72
Q

What is a plaintext attack? (cryptographic)

A
73
Q

What is a ciphertext-only attack?

A
74
Q

What is a downgrade attack?

A