Social Engineering Flashcards

Studying

1
Q

The act of manipulating people into performing actions or divulging confidential information.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of malware that denies access to a computer system until a ransom has been paid.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A small focused targeted attack via email on a particular person or organization with the goal of penetrating their defenses is done after research on the target and has a specific personalized component designed to make the target do something against his or her own interest.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of attempting to acquire sensitive information such as usernames passwords and credit card details by masquerading as a trustworthy entity and using bulk email which tries to evade spam filters emails claiming to be from popular social websites.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software that is specifically designed to disrupt damage or gain unauthorized access to a computer.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Criminal activities carried out by means of computers or the internet.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technique used to gain unauthorized access to computers whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a type of program designed and developed to protect computers from malware like viruses computer worms, spyware, botnets, rootkits, keyloggers and such this function is used to scan, detect, and remove viruses from your computer.

A

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operates more or less independently of other files.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is typically a software application or a hardware device that is used to store and manage a person’s passwords and strong passwords typically all stored passwords are encrypted requiring the user to create a master password to access all managed passwords.

A

Password Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Different types of computer files that have different extensions the letters after the dot.

A

File Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Taking someone else’s social security number date of birth address and other important personal information to establish false credentials and commit fraud.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a numerical label assigned to each device connected to a computer network.

A

Internet Protocol Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In computer science is a rule or pattern that specifies how a certain input sequence often a sequence of characters should be mapped to a replacement output sequence also often a sequence of characters according to a defined procedure.

A

Macros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network of computers and smart devices that have been compromised by malware and are under control of a cybercriminal.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly