Phishing (Quick study) Flashcards
What is phishing?
Phishing is a cyber attack that attempts to obtain sensitive information by masquerading as a trustworthy entity in electronic communication.
True or False: Phishing attacks can only occur via email.
False
Fill in the blank: ________ phishing involves fraudulent communications that appear to come from a reputable source, often through email.
What is spear phishing?
Spear phishing is a targeted attempt to steal sensitive information from a specific individual or organization, often for malicious reasons.
Which type of phishing attack is characterized by the use of fake websites that imitate legitimate ones?
Pharming
True or False: Whaling is a form of phishing that targets high-profile individuals like executives.
True
What is vishing?
Vishing is a type of phishing that uses voice calls, often via phone, to trick individuals into revealing personal information.
Multiple Choice: Which of the following is NOT a type of phishing? A) Email phishing B) Text phishing C) File phishing D) Voice phishing
C) File phishing
What does the term ‘pharming’ refer to?
Pharming refers to redirecting users from legitimate websites to fraudulent ones without their knowledge.
Fill in the blank: ________ phishing is a type of phishing that occurs through SMS messages.
Smishing
What is the primary goal of phishing attacks?
The primary goal of phishing attacks is to steal sensitive information such as usernames, passwords, and credit card details.
True or False: All phishing attacks are easy to detect.
False
What is the difference between phishing and spear phishing?
Phishing is a broad attack targeting a large group, while spear phishing is a targeted attack aimed at a specific individual or organization.
Multiple Choice: Which of the following is a common tactic used in phishing? A) Requesting personal information B) Offering free products C) Both A and B
C) Both A and B
What should you do if you receive a suspicious email asking for personal information?
Do not respond, do not click any links, and report it to your organization’s IT department or the appropriate authority.