Social Engineering Flashcards

1
Q

Pretexting

A

Here a hacker gains information through a series of well crafted lies. Scam initiated by perpetrator pretending to need sensitive information so they can perform critical tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Prepending

A

Adding something to the begging of a item.
Supply info later to be acted on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Third party authorization

A

Using previously used projects to obtain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Impersonation

A

Attacker assumes a role that is recognized by the person being attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Credential harvesting

A

The act of harvesting things such as ID passwords usernames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hoax

A

False stories in the hope to create security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reconnaissance

A

The act of trying to get information before hostilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Invoice scams

A

Sending false invoices to companies in hood that they pay it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whailing

A

The act of spear phishing but upon high value targets like ceo or cfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating / Piggybacking

A

The act of following behind someone to gain physical access to a building using their id or pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shoulder Surfing

A

Act of looking over someone’s should in hopes to gain sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pharming

A

The act of poisoning a DNS server to redirect people to a attackers website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eliciting information

A

Calling in to help desk or tech support to gain information you shouldn’t have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Fraud

A

Use of fake credentials to achieve a end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dumpster diving

A

The act of diving into trash in hopes to gain access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly