Social Engineering Flashcards

1
Q

Phishing

A

Attackers attempt to deceive people into revealing information or installing malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vishing

A

Voice Phishing

Attackers use the phone to trick victims into giving up sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shoulder Surfing

A

An attempt to obtain sensitive information like PIN’s and Passwords by looking over someones shoulder as they input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling Phishing

A

Attackers attempt to deceive top officials and high-ranking members of an organization into giving up trade secrets or company data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spear Phishing

A

A form of Phishing that targets a specific person for their login credentials or financial information, with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgating

A

Following someone through access controlled barriers / doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impersonation

A

An attempt to falsify identity in order to access restricted area’s or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster Diving

A

The act of rummaging through corporate trash in an attempt to obtain sensitive data that was improperly disposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Evil Twin

A

A fraudulent Wi-Fi access point that is configured to eavesdrop on communications, and mimics a familiar SSID to trick users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly