1.1 Social Engineering Techniques Flashcards

(34 cards)

1
Q

What is Phishing?

A

Attackers pretending to be a service provider to extract your information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Typosquatting?

A

A type of URL hijacking
https://professormessor.com
https://professormesser.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Pretexting?

A

Lying in a situation to get information
Another type of URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Pharming?

A

Redirecting a group of people to a bogus website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Vishing?

A

Phishing over a voice call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Smishing?

A

Phishing over text messages (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Reconnaissance?

A

The attacker doing research to build a solid phishing attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Spear Phishing?

A

A specific attack against an indivdual or group of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Whaling?

A

Spear phishing against the CEO or head accountant due to their access to documents and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the pretext phase?

A

Setting the trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the act of Eliciting Information?

A

Getting the victim at ease to make extracting information easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some ways an attacker can use a victims information?

A

Credit card fraud
Bank fraud
Loan fraud
Government benefits fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you protect against Vishing attacks?

A

Don’t disclose personal details
Always verify before revealing info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Dumpster Diving?

A

Gathering important details from things people throw in their trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you protect yourself from Dumpster Diving?

A

Cut documents into small pieces
Burning documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Shoulder Surfing

A

Gathering information by looking over someone’s shoulder to their PC

17
Q

How to you protect yourself from Shoulder Surfing?

A

Be aware of your surroundings
Privacy filter
Keep monitor out of sight

18
Q

What are Computer Hoaxes?

A

A threat that doesn’t actually exist

19
Q

How do you debunk a Computer Hoax?

A

Cross reference hoaxes
Spam filters

20
Q

What are Watering Hole Attacks?

A

Installing malware on a website that a group of people visit

21
Q

How do you defend against the Water Hole?

A

Defense in Depth (Layered defense)
Firewalls and IPS
Antivirus/Antimalware

22
Q

What does SPIM stand for?

A

Spam over instant messaging

23
Q

What are some examples of Spam

A

Commercial advertising
Non-commercial messages
Phishing attempts

24
Q

How does a mail gateway protect against Spam?

A

A personal spam filter can be used in the cloud or a filter on the screened subnet

25
What is rDNS?
Reverse DNS; blocks emails where the sender's domain does not match the IP address
26
What is Tarpitting?
The act of intentionally slowing down the server to increase time between sent and received messages
27
What is Recipient Filtering?
Blocking all emails not addressed to a valid recipient email address
28
What is Hybrid Warfare also known as?
Cyber warfare
29
How can Hybrid Warfare be utilized?
Changing the thinking of another country
30
What is Tailgating?
Unathorized personnel gaining access to a building by closely following someone else
31
How can we prevent tailgating?
Mantraps Visitor policy One scan, one person
32
What are Invoice Scams?
Spear phishing A fake invoice is sent
33
What is Credential Harvesting?
Attackers attempting to gain usernames and passwords stored on a local computer or browser
34
What are the components of Social Engineering?
Being involved in organizations Posing as an "aggressive customer" Posing with authority Social proof Scarcity/Urgency Familiarity Trust