Social Engineering Techniques Flashcards

1
Q

Which of the following social engineering techniques has less of a chance of arousing suspicion and getting caught? (Select all that apply.)

Authority; Intimidation; Familiarity; Liking

A

Familiarity and Liking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user contacted customer support via the company’s WhatsApp link on a website. A few days later, the user received a lot of advertisements from outside of the country, using the same messaging service. Which of the following best describes the type of attack the user is experiencing?

SPIM; Whaling; Spear phishing; Spam

A

SPIM

SPIM is spam (or mass unsolicited messages) but over instant messaging or Internet messaging services, such as WhatsApp, Facebook Messenger, Skype, or Telegram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Pharming attack?

A

A user visits the company web page but is redirected to the attacker’s fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If an attacker purchases a fake domain that has a similar name of a real domain, and then uses the fake domain to send the legitimate company forged notices by email, which of the following attacks did the malicious user perform?

Domain hijacking; Kiting; Tasting; Typosquatting

A

Typosquatting

Typosquatting relies on users navigating to misspelled domains. An attacker registers a domain name with a common misspelling of an existing domain. Users who misspell a URL in the web browser arrive at the attacker’s website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is a type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity

A

Domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is the act of continually registering, deleting, and reregistering a name within the five-day grace period without having to pay for it.

A

Kiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is a Domain Name Server (DNS) exploit that involves registering a domain temporarily to see how many hits it generates within the five-day grace period.

A

Tasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ refers to stealing a password or PIN (or other secure information) by watching the user type it, either in close proximity or remotely.

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a user leaves a workstation unattended while logged on, an attacker can physically gain access to the system (often described as a _____

A

lunchtime attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ______ relies on the circumstance that a group of targets may use an unsecure third-party website, which the attacker has compromised.

A

watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ is a passive means of redirecting users from a legitimate website to a malicious one by corrupting the way the victim’s computer performs Internet name resolution.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is spam (or mass unsolicited messages) but over instant messaging or Internet messaging services, such as WhatsApp, Facebook Messenger, Skype, or Telegram.

A

SPIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly