Week 3 Flashcards

1
Q

Social engineering ___________ means to masquerade as a real or fictitious character and then play out the role of that person on a victim.

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Instead of asking the user to visit a fraudulent website, ________ automatically redirects the user to the fake site.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One type of spear phishing is whaling. Instead of going after the “smaller fish,” _______ targets the “big fish,” namely, wealthy individuals or senior executives within a business who typically would have larger sums of money in a bank account that an attacker could access if the attack is successful.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _______ is a false warning, often contained in an email message claiming to come from the IT department.

A

Hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The amount of spam, or unsolicited email, that goes through the Internet continues to escalate.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Instead of using email to contact the potential victim, a telephone call can be used instead. Known as _________ (voice ________), an attacker calls a victim who, upon answering, hears a recorded message that pretends to be from the user’s bank stating that her credit card has experienced fraudulent activity or that her bank account has had unusual activity.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when a user makes a typing error when entering a uniform resource locator (URL) address in a web browser, such as typing goggle.com (a misspelling) or google.net (incorrect domain) instead of the correct google.com? Most often today the user will be directed to a fake look-alike site.

A

Typo Squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In many regions similar types of animals are known to congregate around a pool of water for refreshment.

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Just as some social engineering attacks rely on psychological manipulation, other attacks rely on physical acts.

A

Physical Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ involves digging through trash receptacles to find information that can be useful in an attack.

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organizations can invest tens of thousands of dollars to install specialized doors that only permit access to authorized users who possess a special card or who can enter a specific code.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly