Social Engineering Techniques Flashcards

1
Q

What is Phishing?

A

Hacker getting user to provide their secure information (usually through fake email links)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Smishing?

A

Type of Phishing that uses SMS messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Vishing?

A

Type as Phishing but uses VOICE / VOIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Spear Phishing?

A

Type of phishing where the hacker attacks a specific person/ user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Whaling?

A

Type of spear phishing where the hacker goes against a the highest possible target (CEO, CIO, CFO, ect….) to get more sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you fight Phishing?

A

primarily done through user training to identify fake emails and URLs and not to provide any sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is web ripper?

A

Software that allows user to download entire websites, usually used by hackers to create phishing websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Shoulder Surfing and how do you fight it?

A

Hacker looking over a users shoulder to steal data. You fight it by user training and providing ways to limit viewing angles (privacy screens)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is dumpster Diving and how do you fight it?

A

Hackers going through an organizations trash to find sensitive information. You fight it by either the shredding or preferably burning documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main concept of social engeenering?

A

To gather data directly from users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What different techniques do social engeers employ use to get data out of users

A

Authority, Intimidation, Consensus, Scarcity, Familiarity, Trust, and Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Authority relating to Social Engineering?

A

When a hacker tries to get information out of user by trying to get users to think they have the Authority to get it (EX. Someone pretending to be in IT, HR, or Accounting).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Intimidation relating to Social Engineering?

A

When a hacker scares users into giving them data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Consensus relating to Social Engineering?

A

When a hacker tries to convince users to give data by using herd mentality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Scarcity relating to Social Engineering?

A

When a hacker tries to convince users to give data by saying something is scarce or in limited supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Familiarity relating to Social Engineering?

A

When a hacker tries to convince users to give data by becoming familiar or “friends” with a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Trust relating to Social Engineering?

A

When a hacker builds trust with a user to gather data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Urgency relating to Social Engineering

A

When a hacker tries to gather data by creating and or claiming an urgency situations.

19
Q

What is Pharming?

A

When a hacker redirects web traffic by manipulating DNS server or DNS Cache (Host File)

20
Q

Where is the Location of the Host File?

A

C:\Windows\System32\Drivers\etc\hosts

21
Q

How do you protect your organization from Pharming?

A

Fight by securing DNS Server/ Settings and using Anti Malware

22
Q

What is Spam?

A

unsolicited messages/ emails`

23
Q

How do you fight spam?

A

fight by only giving your email/ phone number to only repeatable people/ organizations, Use software spam filters such as Barracuda

24
Q

What is SPIM?

A

Spam that comes over Instant Messenger

25
Q

What percentage of emails is classified as Spam

A

48% of all email traffic is classified as spam

26
Q

What is Tailgating?

A

Unauthorized Person/user who follows Authenticated users into secure locations

27
Q

What is Piggy Backing

A

User holding door for Unauthorized users

28
Q

How do you fight Tailgating/ Piggy backing?

A

Fight by using Man Traps (Double Door System) and User Training, Some regulations make Man Traps Mandatory

29
Q

What is prepending social engineer attack?

A

Attacker prepends information to a URL to go to a phishing website. Usually through email links.

30
Q

What is is Identity fraud?

A

Attacker steals your identity and pretends to be you and uses your identity

31
Q

How do you fight identity theft?

A

Fight by monitoring credit score, and not giving out personal information

32
Q

What is an invoice Scam?

A

When attackers send fake invoices to companies trying to collect

33
Q

How do you fight invoice scams?

A

Keeping track of bills and vendors

34
Q

What is Credential Harvesting?

A

Large scale phishing for passwords

35
Q

What is Reconasince

A

when an attacker researches a company (usually for spear phishing)

36
Q

What is a Hoax engineer attack?

A

When an attacker wants you to believe something is happening that is not (fraud)

37
Q

What is Impersonation

A

When an attacker pretends to be someone within the company. Usually coincides with Reconnaissance

38
Q

What is a watering hole attack?

A

Attacker will injects code in websites or applications that your company/ organization uses.

39
Q

How do you fight Watering Hole Attacks?

A

User training to identify legit sites

40
Q

What is Typo Squatting Attacks?

A

It is when an attacker registers domain names with similar names as other sites (IE gooogle.com, Yaho.com)

41
Q

How do you protect customers from possible squatting attacks?

A

you can fight my registering domain names similar to your company domain

42
Q

What is Pretexting?

A

When attackers use lying to accomplish a social engineer attack

43
Q

What is an influence campaign?

A

influence a group of people, usually done through social media

44
Q

What is Hybrid Warfare?

A

it is an influence campaign that is used in Warfare.