Social Engineering Flashcards

1
Q

Broad range of malicious activities accomplished through human interaction. Any attempt to manipulate users to reveal confidential information or perform actions detrimental to a system’s security.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A social engineering attack where the malicious actor communicates with the victim from a supposedly reputable source to lure the victim into divulging sensitive information

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Uses the same technology and techniques but is a more targeted version of phising

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Focused on key executives within an organization or other key leaders, executives, and managers in the company

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The text message service component on cellphones, smartphones, tablets, and other mobile devices
A form of text messaging that also allows pictures, sounds, or videos to be sent

A

Smishing –
Short Message Service (SMS)
Multimedia Messaging Service (MMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Occurs when the message is being communicated to the target using the voice functions of a telephone

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs when an attacker takes over a high-level executive’s email account and orders employees to conduct tasks

A

Business Email Compromise (BEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tricks users into divulging private information by redirecting a victim to a website controlled by the attacker or pen tester

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The abuse of the electronic messaging systems, most commonly through email

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The act of pretending to be someone else in order to gain access or gather information

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communication

A

Evil Twin (Rogue Access Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of evil twin attack that exploits the behavior of Wi-Fi devices due to a lack of access point authentication protocols being implemented

A

Karma Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A list of the SSIDs of any access points the device has previously connected to and will automatically connect to when those networks are in range

A

PNL (Preferred Network List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A web page that the user of a public-access network is obligated to view and interact with before access is granted

A

Captive Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly