1.1 Flashcards

(32 cards)

1
Q

What is an attack characterized by the attacker trying to get the victim to click on a link or log-in to an illegitimate website?

A

PhishingPhishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an attack characterized by the attacker trying to exploit the victim via text message?

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an attack characterized by the attacker trying to exploit the victim via a phone call or What is an attack characterized by the attacker trying to exploit the victim via a phone call or voicemail??

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack that is focused on a large group rather than an individual within the group

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack that is characterized by creating a false URL that is almost identical to a legitimate URL, except it has an extra letter in the beginningPrepending

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of the attacker gathering information about the victim

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack that is characterized by creating a fake URL that is very similar to a legitimate URL, except it has an easy-to-miss misspelling.

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack that involves setting up the scenario by lying to the victim

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____________ is a common causation of a pharming attack.

A

Poisoned DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Poisoned DNS server

A

Caller ID Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A targeted attack with inside information that makes the attacker more believable.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack characterized by the attacker faking to be someone they aren’t.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of an attacker extracting information from the victim.

A

Eliciting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack where the victim’s identity has been exploited.

A

Identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 types of identity fraud

A

Credit card fraud
Bank fraud
Loan fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack characterized by the attacker gaining information about the victim by going through their trash.

A

Dumpster diving

17
Q

An attack characterized by the attacker gaining information by looking at the victim’s computer screen without the victim’s knowledge.

A

Shoulder surfing

18
Q

A threat that seems real, but isn’t real.

19
Q

A third party location or website that attackers exploit in hopes that their target victims will use the location/website and become infected.

A

Watering Hole Attack

20
Q

Unsolicited messages that likely could infect a user if interacted with.

21
Q

Spam that is received through a messaging platform.

A

Spam over instant messaging (SPIM)

22
Q

The Influence Process

A

Fake users create content > post to social media > amplify the message > real users see and share the message > Mass media picks up the story and spreads it everywhere

23
Q

A type of influence campaign that involves changing the way other people think through technology (i.e. cyberwarfare)

A

Hybrid Warfare

24
Q

When an unauthorized individual enters a secure area by following someone through a secured door.

25
An attack where the attacker focuses on the individual that handles financial transactions.
Invoice scams
26
An attack that involves the attacker attempting to access the victim's login information via. the computer's storage system.
Credential harvesting
27
An attack where the attacker specifically targets an important individual that has access to a lot of important information.
Whaling
28
The role of authority in social engineering.
The attacker pretends to be someone important to pressure the victim into giving up important information.
29
The role of intimidation in social engineering.
The attacker threatens the victim in order to gain access to important information.
30
The role of consensus in social engineering.
The attacker tries to convince the victim that what they are requesting is normal/no big deal.
31
The role of scarcity & urgency in social engineering.
The attacker indicates that the information must be given or the change must be made before it's too late.
32
The role of familiarity & trust in social engineering.
The attacker tries to be friendly with the victim to the point where the victim trusts them.