Social Engineering Flashcards

1
Q

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: [2]

A
  • Social engineering

- Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing scams targeting a specific group of people are referred to as:

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing scams targeting people holding high positions in an organization or business are known as:

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which social engineering attack relies on identity theft?

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A situation in which an unauthorized person can view someone’s display or keyboard to learn their password or other confidential information is referred to as:

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tailgating?

A

Gaining unauthorized access to restricted areas by following another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term is used to describe a practice of sifting through trash for discarded documents containing sensitive data?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly