Social Engineering Flashcards

1
Q

Type of social engineering in which an in attacker attempts to obtain sensitive information from users by masquerading as a trusted entity in an email or instant message sent to a large group are often random users 

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Variation of phishing that uses voice communication technology to obtain the information the attacker is seeking

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bulk unsolicited email 

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam that is delivered over instant messaging 

A

Spam over Instant messaging (SPIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A phishing attack that targets, a specific person, or group of people, with some thing in common 

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of going through targets trash in hopes of finding valuable information that might be used in a penetration attempt 

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The attacker directly observes, the individual entering sensitive information on a form, keypad or keyboard 

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Miss directing users to fake websites made to look official. using phishing attackers target individuals one by one by sending out emails. 

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Simple tactic, of following closely behind a person who has just use their own access card or pin to gain physical access to a room or building 

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use a wide range of psychological techniques to convince people whose main job is to help others to perform tasks, resulting in security compromises. This can include calls to or from helpdesk and tech-support units.

A

Eliciting information 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The target is a high value person such as a CEO or CFO 

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The act of adding something else to the beginning of an item. In terms of social engineering, this is the active supplying information that another will act upon frequently before they ask for it, in an attempt to legitimate Mize, the actual request, which comes later

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The use of fake credentials to achieve an end 

A

Identify fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use a fake invoice in an attempt to get a company to pay for things that has not order. 

A

Invoice scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The collection of credential information such as user IDs passwords, and so on enabling an attacker a series of access passes to the system 

A

Credential harvesting 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An adversary will examine the system that they intend to attack using a wide range of methods

A

Reconnaissance

17
Q

Makes a user aware of a false issue and gets the user to do something or spread information.

A

Hoax

18
Q

Attacker assumes the role of somebody at the victim may know

A

Impersonation

19
Q

Using previously obtain the information about a project deadline bosses, and so on the attacker one arrives with some thing the victim is semi expecting, or would see as normal to uses the guise of a project in trouble, or some other situation with the attacker will be viewed as helpful or someone not too upset and three name drop the contact of somebody higher up who happens to be out of officer unreachable does avoiding the reference check

A

Third-party authorization 

20
Q

When a company uses outside parties or contractors for simple tasks, like watering plants or cleaning, the attacker could simply dress up and go out an off time pretending they’re covering for someone 

A

Contractors /outside parties 

21
Q

An example of this would be where an attacker plants malware on a site at and waits for an unsuspecting victim to come across it 

A

Watering hole attack

22
Q

If a user, miss types a URL, then the result should be a 404 error or a resource not found but if an attacker has registered the miss typed URL, then the user would land on the attackers page 

A

Typosquatting 

23
Q

Type of an attack where the attacker uses a narrative to influence the victim into giving up some item of information

A

Pretexting

24
Q

Involve the use of collected information and selective publication of material to Chi individuals and attempt to alter perceptions and change peoples minds on a
Topic 

A

Influence campaigns