Social Engineering Flashcards
2.2 - Explain common threat vectors and attack surfaces 5.6 - Given a scenario, you must be able to implement security awareness practices
What is the focus of social engineering?
A. Exploiting software vulnerabilities
B. Manipulating human psychology for unauthorized access
C. Physical theft of confidential data
D. Developing malware for attacks
Answer:
B. Manipulating human psychology for unauthorized access
Explanation:
Correct: Social engineering leverages human emotions and behaviors to bypass security.
Incorrect Options:
A: Focuses on technical vulnerabilities.
C: Physical theft is not the focus of social engineering.
D: Malware creation is unrelated to this strategy.
(Choose Two)
Which of the following motivational triggers rely on creating psychological pressure?
A. Scarcity
B. Likability
C. Encryption
D. Authority
Answer:
A. Scarcity and D. Authority
Explanation:
Correct:
Scarcity creates pressure by emphasizing limited availability.
Authority compels action through perceived hierarchical power.
Incorrect Options:
B: Likability builds rapport but doesn’t create pressure.
C: Encryption is unrelated to psychological strategies.
Which motivational trigger involves using hierarchical power to compel individuals to comply?
A. Authority
B. Fear
C. Social Proof
D. Urgency
Answer:
A. Authority
Explanation:
Correct: Authority relies on people’s tendency to follow perceived authority figures.
Incorrect Options:
B: Fear uses threats, not hierarchical power.
C: Social Proof relies on observing others, not authority.
D: Urgency emphasizes time pressure.
Which motivational trigger involves influencing decisions based on observing others’ actions?
A. Likability
B. Social Proof
C. Scarcity
D. Fear
Answer:
B. Social Proof
Explanation:
Correct: Social Proof uses the behavior of others to guide decisions.
Incorrect Options:
A: Likability involves rapport-building, not observation.
C: Scarcity focuses on limited resources.
D: Fear employs threats, not group behavior.
What is the primary goal of the scarcity motivational trigger?
A. To create rapport with the target
B. To apply pressure by emphasizing limited availability
C. To build trust through perceived authority
D. To compel action using threats
Answer:
B. To apply pressure by emphasizing limited availability
Explanation:
Correct: Scarcity manipulates urgency by highlighting limited resources.
Incorrect Options:
A: Creating rapport relates to Likability.
C: Building trust through authority is a separate trigger.
D: Compelling action with threats is the domain of Fear.
Which motivational trigger relies on building trust through friendliness or shared interests?
A. Likability
B. Authority
C. Urgency
D. Scarcity
Answer:
A. Likability
Explanation:
Correct: Likability builds rapport through friendliness or shared interests, including pretending to be a friend or using common interests.
Incorrect Options:
B: Authority leverages hierarchical power, not rapport.
C: Urgency focuses on time sensitivity.
D: Scarcity emphasizes limited availability.
(Choose Three)
Which of the following are examples of Likability in social engineering?
A. Sexual attraction
B. Pretending to be a friend
C. Emphasizing urgency
D. Sharing common interests
Answer:
A. Sexual attraction, B. Pretending to be a friend, and D. Sharing common interests
Explanation:
Correct:
Sexual attraction, pretending to be a friend, and sharing common interests are techniques to build rapport using Likability.
Incorrect Option:
C: Urgency is a separate motivational trigger, unrelated to Likability.
Which motivational trigger relies on the threat of negative consequences?
A. Fear
B. Social Proof
C. Scarcity
D. Authority
Answer:
A. Fear
Explanation:
Correct: Fear manipulates individuals by suggesting negative outcomes if they fail to comply.
Incorrect Options:
B: Social Proof influences decisions based on observing others.
C: Scarcity emphasizes limited availability.
D: Authority uses perceived hierarchical power.
(Choose Two)
Which motivational triggers create urgency to manipulate behavior?
A. Scarcity
B. Social Proof
C. Authority
D. Urgency
Answer:
A. Scarcity and D. Urgency
Explanation:
Correct:
Scarcity emphasizes limited resources, creating pressure to act.
Urgency highlights time constraints to compel swift action.
Incorrect Options:
B: Social Proof relies on group behavior, not urgency.
C: Authority compels through hierarchical influence, not urgency.
What is impersonation in the context of cyberattacks?
A. Exploiting a software vulnerability to steal sensitive data
B. Assuming another person’s identity to gain unauthorized access
C. Deploying malware to disrupt organizational operations
D. Using fake domains to confuse users
Answer:
B. Assuming another person’s identity to gain unauthorized access
Explanation:
Correct: Impersonation involves assuming someone else’s identity to gain unauthorized access or steal sensitive data.
Incorrect Options:
A: This describes technical exploitation, not impersonation.
C: Malware is not directly related to impersonation.
D: Fake domains are part of typosquatting, not impersonation.
(Choose Two)
Which are potential consequences of impersonation attacks?
A. Unauthorized access
B. Complete system takeover
C. Malicious insider hiring
D. Increased network bandwidth
Answer:
A. Unauthorized access and B. Complete system takeover
Explanation:
Correct:
Unauthorized access is a direct consequence of impersonation.
Complete system takeover can occur if attackers gain sufficient control.
Incorrect Options:
C: Malicious insider hiring is unrelated.
D: Increased bandwidth usage is unrelated.
Which of the following best describes brand impersonation?
A. Attacker creates a malicious website targeting a trusted brand’s users
B. Attacker pretends to represent a legitimate company or brand
C. Attacker registers a domain name with typographical errors of a popular website
D. Attacker compromises a legitimate website used by their target
Answer:
B. Attacker pretends to represent a legitimate company or brand
Explanation:
Correct: Brand impersonation involves attackers pretending to represent a legitimate brand using logos and language.
Incorrect Options:
A: Describes typosquatting, not brand impersonation.
C: Typosquatting involves registering similar domain names.
D: Describes watering hole attacks, not brand impersonation.
(Choose Three)
Which are effective measures to combat brand impersonation?
A. Educate users about these types of threats
B. Use secure email gateways
C. Register misspelled versions of your domain name
D. Regularly monitor the brand’s online presence
Answer:
A. Educate users about these types of threats, B. Use secure email gateways, and D. Regularly monitor the brand’s online presence
Explanation:
Correct:
Educating users helps them recognize brand impersonation attempts.
Secure email gateways filter out phishing emails.
Monitoring the brand’s online presence detects fraudulent activities.
Incorrect Option:
C: Registering misspelled domain names combats typosquatting, not brand impersonation.
What is typosquatting?
A. A type of phishing email attack
B. A form of impersonation attack using logos and branding
C. Registering domain names with typographical errors of popular websites
D. Compromising a trusted website used by the target
Answer:
C. Registering domain names with typographical errors of popular websites
Explanation:
Correct: Typosquatting involves registering domains similar to popular sites to deceive users.
Incorrect Options:
A: Phishing emails are not related to domain registration.
B: Logos and branding are part of brand impersonation.
D: Describes watering hole attacks, not typosquatting.
(Choose Two)
Which of the following are methods to combat typosquatting?
A. Registering common misspellings of domain names
B. Using secure email gateways
C. Monitoring for similar domain registrations
D. Updating operating systems and software
Answer:
A. Registering common misspellings of domain names and C. Monitoring for similar domain registrations
Explanation:
Correct:
Registering common misspellings prevents attackers from exploiting these domains.
Monitoring for similar domain registrations detects malicious intent.
Incorrect Options:
B: Secure email gateways are for phishing, not typosquatting.
D: Updating systems addresses watering hole attacks, not typosquatting.
What is the primary characteristic of a watering hole attack?
A. Exploiting a domain name with typographical errors
B. Compromising a trusted website used by the target
C. Pretending to represent a legitimate company
D. Sending phishing emails to multiple users
Answer:
B. Compromising a trusted website used by the target
Explanation:
Correct: Watering hole attacks involve targeting websites that the victim frequently uses.
Incorrect Options:
A: Typographical errors are related to typosquatting.
C: Representing a company is brand impersonation.
D: Phishing emails are not related to this attack type.
(Choose Three)
Which of the following are effective measures to mitigate watering hole attacks?
A. Keep systems and software updated
B. Employ advanced malware detection tools
C. Register common misspellings of domain names
D. Use threat intelligence services
Answer:
A. Keep systems and software updated, B. Employ advanced malware detection tools, and D. Use threat intelligence services
Explanation:
Correct:
Updating systems removes vulnerabilities that attackers exploit.
Malware detection tools prevent infections from compromised sites.
Threat intelligence informs organizations about potential threats.
Incorrect Option:
C: Registering misspellings addresses typosquatting, not watering hole attacks.
What is pretexting in the context of social engineering?
A. Using urgency to manipulate a victim into acting without thinking
B. Assuming an identity and using believable information to extract more details from the victim
C. Sending phishing emails with links to fake websites
D. Exploiting a victim’s trust by pretending to represent a trusted brand
Answer:
B. Assuming an identity and using believable information to extract more details from the victim
Explanation:
Correct: Pretexting involves creating a believable backstory or providing partial information to persuade the victim to share more sensitive details.
Incorrect Options:
A: Urgency manipulation describes a different social engineering technique.
C: This describes phishing, not pretexting.
D: Representing a brand refers to brand impersonation.
(Choose Two)
Which of the following best describe the key elements of a pretexting attack?
A. Providing partial, seemingly true information to the victim
B. Exploiting typographical errors to deceive users
C. Using a fabricated scenario to elicit sensitive details from the victim
D. Directly hacking into a victim’s system without interaction
Answer:
A. Providing partial, seemingly true information to the victim and C. Using a fabricated scenario to elicit sensitive details from the victim
Explanation:
Correct:
A pretexting attack uses believable but partial information to gain trust and extract further details.
It involves creating a false but plausible scenario to manipulate the victim.
Incorrect Options:
B: Exploiting typographical errors relates to typosquatting.
D: Pretexting is a social engineering technique, not a direct hacking attempt.
What is the primary goal of a pretexting attack?
A. To create a sense of urgency and rush the victim into action
B. To manipulate the victim into sharing additional information by building a false context
C. To compromise a website frequently visited by the victim
D. To mimic a legitimate company for financial gain
Answer:
B. To manipulate the victim into sharing additional information by building a false context
Explanation:
Correct: Pretexting uses fabricated scenarios to manipulate victims into revealing sensitive information.
Incorrect Options:
A: Urgency is associated with other social engineering techniques like phishing.
C: Compromising websites relates to watering hole attacks.
D: Mimicking companies is brand impersonation.
(Choose Two)
Which of the following are effective methods to mitigate pretexting attacks?
A. Training employees to identify and resist pretext attempts
B. Encouraging employees to fill in information gaps when asked
C. Using advanced malware detection tools
D. Instructing employees not to provide additional information beyond what’s requested
Answer:
A. Training employees to identify and resist pretext attempts and D. Instructing employees not to provide additional information beyond what’s requested
Explanation:
Correct:
Employee training ensures they are aware of pretexting techniques and can recognize them.
Avoiding providing unsolicited information prevents attackers from exploiting gaps.
Incorrect Options:
B: Filling in gaps directly aids pretexting attackers.
C: Malware detection tools are not directly related to pretexting mitigation.
What key concept should employees remember to avoid falling victim to pretexting attacks?
A. Always verify a caller’s identity and provide minimal information
B. Respond quickly to any requests involving sensitive data
C. Trust any individual who provides partial correct information
D. Assume that all requests from colleagues are legitimate
Answer:
A. Always verify a caller’s identity and provide minimal information
Explanation:
Correct: Verifying identity and providing only necessary information are essential to counter pretexting.
Incorrect Options:
B: Acting quickly without verification aids attackers.
C: Trusting partial information can lead to falling victim.
D: Requests from colleagues should be verified for authenticity.