Social Engineering Flashcards

1
Q

Spoofing

A

This is a human-based or software-based attack where the goal is to pretend to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shoulder surfing

A

Goal is to look over the shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Impersonation

A

Human attack when the attacker pretends to be someone he is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hoax

A

Email-based or web-based attack intended to trick the user into performing undesired actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

email-based attempt to get financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vishing

A

Human-based. goal is to extract personal, financial, confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

form of phishing that targets individuals known to possess a good deal of wealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spam/spim

A

Social networking based; Spim is internet messaging attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero day attack

A

Exploits a previously unknown vulnerability in an application of OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute force attack

A

Uses password-cracking software to try possible combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dictionary attack

A

Automates password guessing by comparing encrypted passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Eavesdropping or Sniffing attack

A

Special monitoring software to intercept private network communications; aimed at content or passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Man-in-the-middle

A

Attacker redirects traffic between two victims to capture information between the sender and receiver; could result in hijacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zombies

A

Attacker introduces unauthorized software that directs the devices to launch and attack. Distributed Denial of Service (DDoS) attacks: collection of devices taken over by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Botnets

A

Distributed Denial of Service (DDoS) attacks: A collection of internet-connected programs communicating with other similar programs in order to perform tasks that can be used to send spam email or participate in DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly