J.Dion Sec. 5 Social Engineering Flashcards

1
Q

Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 main types social engineers use?

A

Authority
Urgency
Social proof
Scarcity
Likability
Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The power or right to give orders, make decisions, and enforce obedience.

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions.

A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Psychological phenomenon where individuals look to the behaviors and actions of other to determine their own decisions or actions in similar situations.

A

Social proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply.

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is associated with being nice, friendly, and socially accepted by others.

A

Likability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening.

A

Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four main forms of impersonation used by attackers?

A

Impersonation
Brand impersonation
Typosquatting
Watering Hole Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Specific form of impersonation where an attacker pretends to represent a legitimate company or brand.

A

Brand Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical error.

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Typosquatting is also known as 2 other names

A

URL hijacking
Cyber-squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use.

A

Watering hole attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 6 types of phishing attacks?

A

Phishing
Vishing
Smishing
Whaling
Spear phishing
Business email compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords and credit card numbers.

A

Phishing

17
Q

Used by cybercriminals who are more tightly focused on a specific group of individuals or organizations.

A

Spear phishing

18
Q

“Spray and pray” mode?

A

Phishing

19
Q

Targeted users mode?

A

Spear phishing

20
Q

Form of spear phishing that targets high-profile individuals like CEOs or CFOs.

A

Whaling

21
Q

Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker.

A

Business email compromise (BEC)

22
Q

Phone-based attack in which the attacker deceives victims into divulging personal or financial information.

A

Vishing (Voice phishing)

23
Q

Attack that uses text messages to deceive individuals into sharing their person information.

A

Smishing (SMS phishing)

24
Q

Vital tool for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training.

A

Anti-phishing compaign

24
Q

Manipulating a situation or creating a distraction to steal valuable items or information.

A

Diversion theft

24
Q

This type of attack, the attacker manipulates the DNS server settings, so that when a user types a legitimate website URL they are redirected to a fake website.

A

DNS spoofing

24
Q

Malicious deception that is often spread through social media, email, or other communication channels.

A

Hoax

25
Q

What two types of attack are hoaxes usually paired with?

A

Phishing attacks
Impersonation attacks

26
Q

Looking over someone’s shoulder to gather personal information.

A

Shoulder surfing

27
Q

Virtual or physical searching through trash to find valuable information.

A

Dumpster diving

28
Q

The process of secretly listening to private cnonversations.

A

Eavesdropping

29
Q

What type of attack is paired with eavesdropping?

A

On the path attack

30
Q

Planting a malware-infected device for a victim to find and unintentionally introduce malware to their organization’s system.

A

Baiting

31
Q

Which of the following types of phishing attacks is used to specifically target high-level executives or important officials within an organization?

a. Phishing
b. Whaling
c. Spear phishing
d. Impersonation

A

b. Whaling

32
Q

During an anti-phishing campaign, what primary action should a company take after simulating a successful phishing attack on its employees?

a. Terminate the employees who fall for the simulated attack.
b. Send a warning email to all employees so they will be aware of phishing as a problem.
c. Provide remedial training to all employees who fell for the attack.

A

c. Provide remedial training to all employees who fell for the attack.

The primary goal of the campaign is to raise awareness.

33
Q

Which social engineering technique involves searching through a target’s trash or discarded items to obtain sensitive or valuable information?

a. Diversion theft
b. Shoulder surfing
c. Eavesdropping
d. Dumpster diving

A

d. Dumpster diving

34
Q

Which social engineering attack involves an attacker creating a fabricated scenario to manipulate or deceive someone into divulging confidential information?

a. Pretexting
b. Dumpster diving
c. Shoulder surfing
d. Eavesdropping

A

a. Pretexting

Form of social engineering where attackers create a scenario or pretext to manipulate/deceive someone into sharing confidential information.

35
Q

Which of the following is a common motivational trigger used in social engineering attacks to manipulate victims to act or respond without taking time to think about the consequences?

a. Likability
b. Authority
c. Urgency
d. Social proof

A

c. Urgency

36
Q
A