Module 9 - Social Engineering Flashcards

1
Q

The art of convincing people to reveal confidential information.

a. Dumpster Diving
b. Eavesdropping
c. Social Engineering
d. Shoulder Surfing

A

c. Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering Techniques:

  • Unauthorized listening of conversations, or reading of messages.
  • Interception of audio, video, or written communication.
  • It can be done using communication channels such as telephone lines, email, instant messaging, etc.
    a. Dumpster Diving
    b. Eavesdropping
    c. Social Engineering
    d. Shoulder Surfing
A

b. Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering Techniques:

  • Uses direct observation techniques such as looking over someone’s shoulder to get information such as passwords, PINs, account numbers, etc.
  • Can also be done from a longer distance with the aid of vision enhancing devices such as binoculars that are equipped with the capability of obtaining long distance information.
    a. Dumpster Diving
    b. Eavesdropping
    c. Social Engineering
    d. Shoulder Surfing
A

d. Shoulding Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social Engineering Techniques:

  • Is looking for treasure in someone else’s trash.
  • It involves collection of phone bills, contact information, financial information, operations related information, etc. from the target company’s trash bins, printer trash bins, user desk for sticky notes, etc.
    a. Dumpster Diving
    b. Eavesdropping
    c. Social Engineering
    d. Shoulder Surfing
A

a. Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering Techniques:

  • An authorized person allows (intentionally or unintentionally) an unauthorized person to pass through a secure door.
  • “I forgot my badge at home, can you help me.”
    a. Piggybacking
    b. Tailgating
A

a. Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Engineering Techniques:

  • An unauthorized person enters a secured area by closely following an authorized person through a door requiring key access.
    a. Piggybacking
    b. Tailgating
A

b. Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering Techniques:

Is a practice of sending an illegitimate email falsely claiming to be from a legitimate site in an attempts to acquire a user’s personal or account information.

a. Pharming
b. Whaling
c. Spear Phishing
d. Phishing

A

d. Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering Techniques:

An attacker targets high profile executives like CEO, CFO, politicians and celebrities who have complete access to confidential and highly valuable information.

a. Pharming
b. Whaling
c. Spear Phishing
d. Phishing

A

b. Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering Techniques:

  • A targeted phishing attack aimed at specific individuals within an organization.
  • Attackers use this attack to send a message with specialized, social engineering content directed at a specific person, or a small group of people.
    a. Pharming
    b. Whaling
    c. Spear Phishing
    d. Phishing
A

c. Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Engineering Techniques:

  • Attacker redirects the web traffic to a fraudulent website by installing malicious program on a personal computer or server.
  • AKA: DNS Cache Poisoning
    a. Pharming
    b. Whaling
    c. Spear Phishing
    d. Phishing
A

a. Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ ____ occurs when someone steals your personally identifiable information for fraudulent purposes.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Countermeasures:

What are the correct examples of 2 Factor & Multifactor Authentication?

a. Username
b. CAC & PIN
c. Password
d. Fingerprint Scan (Biometric)
e. Username/Password & Biometric
f. CAC/PIN & Biometric

A

b. CAC & PIC
e. Username/Password & Biometric
f. CAC/PIN & Biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly