Part I: Attacks, Threats and Vulnerabilities Flashcards

1
Q

Domain 1.0: Attacks, Threats and Vulnerablities

The process by which an attacker seeks to extract useful information from users, often by just tricking them into helping the attacker.

1.1 Compare and contrast different types of social engineering technique

A

Social Engineering

(pg.#)

Chapter 1: Social Engineering Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain 1.0: Attacks, Threats and Vulnerablities

1. Following closely behind someone who has authorized physical access in an environment.
2. Involves appearing to be a part of an authorized group or capitalizing on people’s desire to be polite

1.1 Compare and contrast different types of social engineering technique

A

Tailgating

(pg.#)

Chapter 1: Social Engineering Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly