Threats, Attacks and Vulnerabilities - Common Attack Types Flashcards

1
Q

A form of spear phishing that attempts to target high-level executives.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A phishing attack that attempts to target specific groups of users, or even a single user.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Trojan that masquerades as a free antivirus program.

A

Rogueware (or scareware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The practice of using social tactics to trick users into giving up information or performing actions they wouldn’t normally take.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A social engineering tactic whose goal is to convince an authorised user to provide some information or help the attacker defeat a security control.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Looking over the shoulder of someone to gain information.

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The practice of one person following closely behind another without showing credentials.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An effective tactic used to prevent tailgating.

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The practice of searching through trash or recycling containers to gain information from discarded documents.

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of attack used to discover which web sites a group of people are likely to visit and then infects those web sites with malware that can infect the visitors.

A

Watering hole attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unwanted or unsolicited email.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The use of a phone system to trick users into giving up personal and financial information.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly