Section 29 Social Engineering Flashcards

1
Q

Manipulates a user into revealing confidential information that are detrimental to that user or the security of our systems.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A person who works for or with your organization but has ulterior motives.

A

Insider Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attempt to fraudulently obtain information from a user (usually by email).

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attempt to fraudulently obtain information from a user, usually by email that targets a specific individual.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A form of spear phishing that directly targets the CEO, CFO, CIO, CSO, or other high value targets in an organization.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing conducted over text messaging (SMS)

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing conducted over voice and phone calls

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing attempt to trick a user to access a different or fake website (usually by modifying hosts file).

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

People are more willing to comply with a request when they think it is coming from someone in authority.

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

People are usually in a rush these days and urgency takes advantages of this fact.

A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

People are more likely to click on a link through social media or based on seeing others have already clicked on it.

A

Social Proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technique that relies on the fear of missing out on a good deal that is only offered in limited quantities or a lmited time.

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technique where the social engineer attempts to find common ground and shared interests with their target.

A

Likeability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The use of threats or demands to intimidate someone into helping you in the attack.

A

Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a thief attempts to take responsibility for a shipment of diverting the delivery to a nearby location.

A

Diversion Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a person uses direct observation to obtain authentication information.

A

Shoulder Surfing

17
Q

When an unauthorized person tags along with an authorized user to gain entry to a restricted area.

A

Piggy Backing

18
Q

When an attacker figures out where users like to go, and places malware to gain access to your organization.

A

Watering Hole Attack

19
Q

The wrongful or criminal deception intended to result in financial or personal gain.

A

Fraud

20
Q

The use by one person of another person’s personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person.

A

Identity Fraud

21
Q

A technical method used in social engineering to trick users into entering their username and passwords by adding an invisible string before the weblink they click.

A

Prepending

22
Q

Policy where all employees must put away everything from their desk a the end of the day into locked drawers and cabinets.

A

Clean Desk Policy