Social Engineering Flashcards

1
Q

What is a manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the best defense to help with Social Engineering?

A

Provide security awareness training to the users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some motivational triggers for social engineering:

A

Familiarity and likability
Consensus and Social Proof
Authority and information
Scarcity and Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 4 of the most used social engineering techniques used by attackers:

A

Impersonation - assume identity of another individual
Brand Impersonation - imitating a company or brand
Typo Squatting - create and faking a website name - url
Watering Hole Attacks - where a website or service is compromised that their target attack is known to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Another way Social Engineers try to attack is using________ like as a Bank official, IT Support, and Law Enforcement calling and then asking for them to give like printer info and IP address info.

A

Pre-Texting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some of the types of phishing attacks that Social Engineers use:

A

Phishing - like spray and pray approach
Vishing
Smishing
Spear Phishing - target users
Whaling
Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Manipulating a situation or creating a distraction to steal valuable items or information is known as__________ _______ attack. An example would be utilizing a DNS spoofing attack that redirects you to a fake website.

A

Diversion Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Malicious deception that is often spread through social media, email, or other communication channels. they are often paired with phishing and impersonation attacks.

A

Hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Looking over someone’s shoulder to gather personal information, you can actually use high-powered cameras or closed-circuit television cameras, is known as:

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Searching through trash trying to find personal information, or if an attacker is able to access your computer and can see your “Trash”folder these attacks are called virtual or digital ___________ _____________.

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of secretly listening to private messages, like when you’re on the phone or conference call. Maybe wire tapping, or intercepting network traffic. they could take the form of an adversary in the middle or on-path attack. The perp intercepts the communication without the parties knowing.

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Planting a malware-infected device for a victim to find and unintentionally introduce malware to their org’s system. like leaving a USB drive left somewhere that someone picks up and pops it in their computer.

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this is when an attacker tricks and authorized employee into using their access badge to grant them entry into the facility because they supposedly lost or left their badge somewhere.

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this is when an attacker attempts to follow an an employee through something like a turnstile, control vestibule or some type of access point without that person knowing.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Six types of motivational triggers are:

A

Authority - Like claiming to be the IRS
urgency - pushing so you will ignore normal sec procedures
social proof - getting likes on your website so people trust
scarcity - making you believe time is limited / short supply.
likability - trying to be accepted / liked by others
Fear - making you afraid of someone, dangerous, painful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This Type of Phishing is used by Cybercriminals who are more tightly focused on a specific group of individuals or organizations that has a higher success rate at deceiving people

A

Spear Phishing

17
Q

this is a form of Spear fishing that targets high-profile individuals, like CEO’s or CFO’s

A

Whaling

18
Q

this is an advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker

A

Business Email Compromise ( BEC )

19
Q

what is a phone based attack in which the attacker deceives victims into divulging personal or financial information

A

Vishing ( voice Phishing )

20
Q

what is a type of attack that uses text messages to deceive individuals into sharing their personal information

A

Smishing ( SMS Phishing )

21
Q

What is a vital tool called that is used for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training? they also offer remedial training for users who fell victim to simulated phishing emails

A

Anti-phishing Campaign

22
Q

some common characteristics of phishing emails include:

A

Generic Greetings
Spelling and grammar mistakes
spoofed email addresses

23
Q

What is the name of a free program that creates a fake phishing campaign by Trend Micro:

A

Phish Insight

24
Q

What is the wrongful or criminal deception intended to result in financial or personal gain or steal from you called:

A

Fraud

25
Q

What is the use by one person of another person’s personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person called? Like trying to get your birthdate, credit card info, or SS number. Example would be: An attacker takes the victims credit card number and makes charges on it.

A

Identity fraud

26
Q

What is it called when an attacker tries to fully assume the identity of their victim?

A

Identity theft

27
Q

What is a scam called in which a person is tricked into paying for a fake invoice for a service or product that they did not order

A

Invoice Scam

28
Q

When an invoice scam sent directly to an organization this can be considered:

A

spear Phishing

29
Q

In Cybersecurity, the main focus is on _________ __________ campaigns by high-level actors such as nation-states and hacktivists.

A

malicious influence

30
Q

Inaccurate information shared unintentionally is known as:

A

Misinformation

31
Q

The Intentional spread of false information to deceive or mislead someone is known as:

A

Disinformation

32
Q

Some _______ campaigns can also serve an attackers financial interests.

A

influence

33
Q
A