p3 q1 Flashcards

1
Q

is the term used for a broad range of malicious
activities accomplished through human interactions. It uses
psychological manipulation to trick users into making security
mistakes or giving away sensitive information

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

social engineering attack lifecycle

A
  1. investigation
  2. hook
  3. play
  4. exit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What makes social engineering especially dangerous is that_______, rather than vulnerabilities in software
and operating systems.

A

it relies on human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

social engineering attack techniques

A
  1. baiting
  2. scareware
  3. pretexting
  4. phishing
  5. spear phishing
  6. quid pro quo (something for something)
  7. honey traps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attacks are a bundle of false
promises to exasperate a sufferer’s cupidity or curiosity

A

baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

involves victims being bombarded with false alarms and
fictitious threats.

A

scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Here an attacker obtains information through a series of
cleverly crafted lies.

A

pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are email and text message campaigns aimed
at creating a sense of urgency, curiosity or fear in victims. It then
tricks them into revealing sensitive information, clicking on links to
malicious websites, or opening attachments that contain malware.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

whereby an attacker chooses specific individuals or enterprises.

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the attackers promise a
reward in exchange for information.

A

quid pro quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attackers usually target the
person who likes to get involved romantically or sexually
with someone online

A

honey traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it typically refers to an individual who uses his or her skills
to achieve unauthorized access to systems or networks so as to
commit crimes

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

types of hackers

A
  1. black hat
  2. white hat
  3. grey hat
  4. green hat
  5. blue hat
  6. red hat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

are groups of hackers,
programmers and other tech bandits who combine their skills
and resources to commit major crimes that might not otherwise
be possible

A

organized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

types of organized hackers

A
  1. hacktivist
  2. terrorists
  3. state-backed hackers
  4. internet stalkers
  5. disgruntled employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

driven by a particular political or social agenda.

A

hacktivists

17
Q

the unlawful use of violence and intimidation,
especially against civilians, in the pursuit of political aims.

A

terrorists

18
Q

are carried out by cyber criminals
directly linked to a nation-state to exploit infrastructure
vulnerabilities

A

state-backed hackers

19
Q

are people who maliciously monitor the web
activity of their victims to acquire personal data.

A

internet stalkers

20
Q

become
hackers with a particular motive and also commit cyber crimes

A

disgruntled employees

21
Q

a kind of information gathering on
network system and services. This enables the attacker to
discover vulnerabilities or weaknesses on the network

A

reconnaissance

22
Q

type of network attacks

A
  1. ping sweeps
  2. port scans
  3. packet sniffing
  4. access attacks
23
Q

is a network scanning technique you can use to find
out which IP addresses map to live hosts.

A

ping sweeps

24
Q

ping sweeps also known as

A

ICMP (internet control message protocol)

25
a common technique used to discover open doors or weak points in a network.
port scans
26
technique whereby packet data flowing across the network is detected and observed.
packet sniffing
27
An access attack allows an individual to gain unauthorized access to information that they have no right to view
access attacks
28
is a method of breaking into a password protected computer, network or other IT resource by systematically entering every word in a dictionary as a password.
dictionary attack
29