Social Engineering Flashcards
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:
Social engineering
A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: [2]
- Social engineering
- Phishing
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:
Phishing
Phishing scams targeting a specific group of people are referred to as:
Spear phishing
Phishing scams targeting people holding high positions in an organization or business are known as:
Whaling
Which social engineering attack relies on identity theft?
Impersonation
A situation in which an unauthorized person can view someone’s display or keyboard to learn their password or other confidential information is referred to as:
Shoulder surfing
What is tailgating?
Gaining unauthorized access to restricted areas by following another person
What term is used to describe a practice of sifting through trash for discarded documents containing sensitive data?
Dumpster diving