Phishing Terms Flashcards

1
Q

What is phishing?

A

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Phishing attacks only occur via email.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A common type of phishing attack that uses fake websites is called _______.

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the term ‘spear phishing’ refer to?

A

A targeted phishing attack aimed at a specific individual or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of phishing involves phone calls?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is a sign of a phishing email? A) Generic greeting B) Personalized content C) Professional tone D) All of the above

A

A) Generic greeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ‘whaling’ in the context of phishing?

A

A type of phishing attack that targets high-profile individuals such as executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Phishing attacks can lead to identity theft.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: Phishing attacks often use _______ to create a sense of urgency.

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a ‘phishing kit’?

A

To provide tools and resources for launching phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multiple Choice: Which of the following is NOT a common method used in phishing attacks? A) Spoofing email addresses B) Creating fake websites C) Using secure encryption D) Sending malicious attachments

A

C) Using secure encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ‘credential harvesting’ mean?

A

The process of collecting user credentials through phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Phishing attacks can only be executed by individuals with advanced technical skills.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: An email that appears to be from a bank asking for account verification is an example of _______.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ‘smishing’?

A

Phishing conducted via SMS or text messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multiple Choice: Which of the following is a common tactic used by phishers? A) Offering free products B) Requesting payment for services C) Asking for personal information D) All of the above

A

D) All of the above

17
Q

What is the primary goal of phishing attacks?

A

To steal sensitive information such as usernames, passwords, and credit card details.

18
Q

True or False: Phishing attacks are only a concern for individuals, not businesses.

A

False

19
Q

Fill in the blank: Phishing emails often contain _______ that lead to malicious websites.

A

links

20
Q

What is a ‘phishing simulation’?

A

A training exercise designed to educate users about recognizing phishing attempts.