Section 1 – Attacks, Threats, and Vulnerabilities 1.1 – Social Engineering Flashcards

1.1 – Social Engineering

1
Q

What is Phishing

1.1 - Social Engineering

A

The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an impersonation attack

1.1 - Social Engineering

A

An impersonation attack is a form of fraud in which attackers pose as a known or trusted person to dupe an employee into transferring money to a fraudulent account, sharing sensitive information (such as intellectual property, financial data or payroll information), or revealing login credentials that attackers can used to hack into a company’s computer network.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Dumpster Diving

1.1 - Social Engineering

A

Dumpster diving is the process of searching trash to obtain useful information about a person/business that can later be used for the hacking purpose.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Shoulder Surfing

1.1 - Social Engineering

A

A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Watering Hole Attacks

1.1 - Social Engineering

A

In a watering hole attack, the attacker compromises a site likely to be visited by a particular target group rather than attacking the target group directly.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spam

1.1 - Social Engineering

A

Spam is unwanted, unsolicited digital communication sent out in bulk. Spam is annoying, but it’s also a threat.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an influence campaign

1.1 - Social Engineering

A

Influence campaigns are large-scale campaigns that seek to shift public opinion. Such campaigns are usually carried out in bad faith and often seek to push a false narrative.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Hoaxes

1.1 - Social Engineering

A

A hoax can be an E-mail message distributing false, often disturbing, information designed to trick recipients into passing the same note on to other e-mail users.

1.1 - Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly