Core 2: Social Engineering Flashcards

1
Q

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

Shoulder surfing
Privilege escalation
Social engineering
Penetration testing

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)

 Phishing
 Watering hole attack
 Social engineering
 Bluejacking
 Vishing
A

Phishing

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

Phishing
Privilege escalation
Backdoor access
Shoulder surfing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing scams targeting a specific group of people are referred to as:

Vishing
Spear phishing
Spoofing
Whaling

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing scams targeting people holding high positions in an organization or business are known as:

 Vishing
 Bluesnarfing
 Whaling
 Bluejacking
 Pharming
A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which social engineering attack relies on identity theft?

Tailgating
Dumpster diving
Impersonation
Watering hole attack

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A situation in which an unauthorized person can view someone’s display or keyboard to learn their password or other confidential information is referred to as:

Spear phishing
Tailgating
Shoulder surfing
Spoofing

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tailgating?

Acquiring unauthorized access to confidential data

Looking over someone’s shoulder to get information

Gaining unauthorized access to restricted areas by following another person

Manipulating a user into disclosing confidential information

A

Gaining unauthorized access to restricted areas by following another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In computer security, the term “Dumpster diving” is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly