Core 2: Social Engineering Flashcards
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:
Shoulder surfing
Privilege escalation
Social engineering
Penetration testing
Social engineering
A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)
Phishing Watering hole attack Social engineering Bluejacking Vishing
Phishing
Social engineering
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:
Phishing
Privilege escalation
Backdoor access
Shoulder surfing
Phishing
Phishing scams targeting a specific group of people are referred to as:
Vishing
Spear phishing
Spoofing
Whaling
Spear phishing
Phishing scams targeting people holding high positions in an organization or business are known as:
Vishing Bluesnarfing Whaling Bluejacking Pharming
Whaling
Which social engineering attack relies on identity theft?
Tailgating
Dumpster diving
Impersonation
Watering hole attack
Impersonation
A situation in which an unauthorized person can view someone’s display or keyboard to learn their password or other confidential information is referred to as:
Spear phishing
Tailgating
Shoulder surfing
Spoofing
Shoulder surfing
What is tailgating?
Acquiring unauthorized access to confidential data
Looking over someone’s shoulder to get information
Gaining unauthorized access to restricted areas by following another person
Manipulating a user into disclosing confidential information
Gaining unauthorized access to restricted areas by following another person
In computer security, the term “Dumpster diving” is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.
True
False
True