Mod 2 Common Attacks Flashcards

1
Q

Phishing

A

A technique that uses digital communication to trick people into revealing sensitive data or deploying malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Email Compromise (BEC)

A

A phishing attack where a threat actor impersonates a known source to make a seemingly legitimate request for information, often with the goal of obtaining a financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spear Phishing

A

A targeted phishing attack that focuses on a specific user or group of users, often using personalized information to make the attack more believable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

A type of spear phishing that specifically targets high-profile individuals, such as company executives, to gain access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

A phishing attack that uses voice communication, such as phone calls, to trick users into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A

A phishing attack that uses text messages to trick users into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Software designed to harm devices or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

Malicious code that infects a device and can cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worm

A

A type of malware that can self-replicate and spread across systems on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

A type of malware that encrypts an organization’s data and demands payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social Media Phishing

A

A social engineering attack where a threat actor collects information about their target from social media and then uses that information to launch an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Malware that gathers and sells information without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering Hole Attack

A

A social engineering attack where a threat actor infects a website that is frequently visited by a specific group of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

USB Baiting

A

A social engineering attack where a threat actor leaves a malware-infected USB stick in a location where it is likely to be found and used by an unsuspecting victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical Social Engineering

A

A social engineering attack where a threat actor impersonates an employee, customer, or vendor to gain unauthorized access to a physical location.

16
Q

Authority

A

A social engineering tactic that exploits people’s tendency to respect and follow authority figures.

17
Q

Intimidation

A

A social engineering tactic that uses bullying tactics to persuade and intimidate victims into doing what they are told.

18
Q

Consensus/Social Proof

A

A social engineering tactic that uses the principle of social proof to persuade people to do something because they believe that others are doing it.

19
Q

Scarcity

A

A social engineering tactic that implies that goods or services are in limited supply to create a sense of urgency.

20
Q

Familiarity

A

A social engineering tactic that establishes a fake emotional connection with users that can be exploited.

21
Q

Trust

A

A social engineering tactic that establishes an emotional relationship with users over time to gain their trust and personal information.

22
Q
A