Threat, Vulnerabilities and Mitigations: Social Engineer Flashcards

1
Q

What is Phishing?

A

Phishing: Using a fake or fradulent email or website solicitations to gain sensitive information. These are email or message based or can be typo-squatting schemes where a threat actor creates a website address that’s seemingly for a popular site but which is misspelled slightly in such a way that’s common were people to enter it wrong or which they might not notice when selecting it in a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Smishing?

A

Smishing: Using text messages, seemingly from a legitmate company, to trick people into revealing sensitive information, such as credit-card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is IM?

A

IM: Using instant messages (IMs) to perpetuate attachments that have viruses or which go to webpages that then infect devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Vishing?

A

Vishing: Using phone calls and voice messages to trick people into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the hallmark of Social Engineering?

A

A hallmark of social-engineering attacks is that the threat actors use misinformation, disinformation, and impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is Pretexting schemes work?

A

Pretexting schemes: Using contrived, deceitful scenarios to help sell their schemes. Watering hole attacks: Infecting websites so as to compromise a targeted person’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Brand impersonation work?

A

+ Brand impersonation: Copying, nearly, a brand’s look and feel, but with slight changes so people don’t necessarily notice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Image-based and file-based attacks?

A

+ Image-based and file-based attacks: Sending an image or file that encourages a person to select a link, which then can infect or turn over control of a computer or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly