Lesson 4 - Evaluating Human and Physical Vulnerabilities Flashcards

1
Q

A social engineering tactic where a team will communicate, whether directly or indirectly, a like or half-truth in order to get someone to believe a falsehood

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the term for acquiring data from a target during a social engineering attack

A

Elicitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the attack when a bad actor gains control of an email account and uses it to convince other employees to perform fraudulent actions

A

Business Email Compromise (BEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious actor tricks the user into performing undesired actions such as deleting files

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the set of tools in Kali Linux that has built-in features to help launch a phishing campaign

A

Social Engineering Toolkit (SET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name of the impersonation attack in which a request for a website, typically e-commerce site is redirected to a similar-looking but fake website

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the social engineering attack when someone uses for example a USB stick enticing you to plug it in

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phone based Phishing is referred to as _________

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unsolicited phone phishing is referred to as ________

A

Spam over Internet Telephony (SPIT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of Instant Messaging Phishing types:

A

Instant Messaging Spam
Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The type of attack where they target a group or org by discovering what websites they frequent and inject malicious code into those sites

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are supply chain attacks more impactful

A

They have a wider range of impact of both target org and associated clients and vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term related to Supply Chain Attacks where it harms an associated vendor and who is liable

A

Downstream liability and the original target org is liable.

Use Target example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name where an attacker registers and users a domain name for example similar to the one hoping for a misspelling such as amazen.com

A

Typosquatting which is a form or URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it when someone copies the actions of others in order to appear competent or cooperative in the eyes of others

A

Social Proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a Standard peer-to-peer radio communications over a short distance facilitating badge or contactless payments

A

Near-Field Communication (NFC)

17
Q

What is some key differences between tailgating and piggybacking

A

In Piggybacking the the target knows someone is following them

18
Q
A