Social Engineering and Security Fundamentals Flashcards

1
Q

What does CIA stand for in the CIA Triad?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vulnerability?

A

A weakness (i.e. software bug and default settings)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat?

A

An event that violates the CIA Triad (i.e. Malware, Phishing Scam, and Hackers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an attack?

A

An exploitation of vulnerabilities (i.e. Network Attacks and Application Attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Social Engineering.

A

Someone attempting to trick an individual in order to get credentials or either physical or virtual access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Phishing.

A

Contacting a person as if you are a representative of their company or another reputable company in order to get personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Vishing?

A

Phishing with voice over IP or phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Smishing?

A

Phishing with SMS text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Spear Phishing?

A

Phishing targeted at certain companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Whaling?

A

Phishing targeting those with higher levels of authority (i.e. CEOs, network admins)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Pharming?

A

Redirecting an end user to a site that is installed on their PC, usually in the DNS cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Watering Hole attack?

A

Spoofing one website that you know a lot of people from a certain organization will be going to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Credential Harvesting?

A

Using a watering hole attack or another method to harvest credentials likely with the intent to sell them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Typo Squatting?

A

Registering URLs that are slightly off from the original site to take advantage of typos to send people to malicious sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name FOUR physical social engineering techniques:

A

Dumpster diving, Shoulder Surfing, Tailgating, and Pretexting (using pre thought up stories)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Invoice Scam?

A

An individual acts as a representative of an organization that your organization does business with, requesting payment. They harvest your payment information.

17
Q

What is a Hoax?

A

A message warning the recipients of a non-existent computer virus threat

18
Q

What is Prepending?

A

Modifying information in the front of a URL