Reconnaissance Flashcards

1
Q

When an attacker goes through trash to find sensitive information.

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When an attacker stands near or behind victim while they are on their computer.

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A threat created by the attacker to overwhelm the victim so they willingly give over sensitive information.

A

Hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When an attacker infects a third-party site to infect computers within your organization.

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unsolciaited messages in email, text messages or web-browsers

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When an attacker tries to sway public opinion on social media.

A

Influence Campaigns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When an attacker enters an unauthroized location by following someone else.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When an attacker sends a fake bill to a business.

A

Invoice Scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attacker extracts credentials from an application like Chrome.

A

Credential Harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A social engineering technique where an attacker impersonates someone higher ranking than you.

A

Appeal to Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A social engineering technique where an attacker warns that if the information they are requesting is not received, something bad will happen.

A

Intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A social engineering technique where an attacker says someone else performs this task all the time for them.

A

Consenus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A social engineering technique where an attacker makes their requests seem time or resource sensitive.

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A social engineering technique where an attacker makes their requests seem just time sensitive.

A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly