1.1 Social Engineering Techniques Flashcards

1
Q

What is it called when somebody attains a password or sensitive information by discretely observing it being entered, often using phone cameras, binoculars, or a telescope?

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing that uses phone calls as a vector

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This tactic involves spoofing an ip or MAC address, masquerading as a legitimate entity, or spoofing phone, email, and SMS communication in order to attain information

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This form of warfare involves traditional forms of warfare as well as the incorporation of the cyber realm in a non-traditional way.

A

Hybrid Warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is it called when spam is carried out over an instant messenger service?

A

SPIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing targeting an important figure or C-Team person in an organization

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This type of attack uses DNS poisoning to redirect web traffic to a spoofed website in order to install malware

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This attack type often targets companies who outsource, perform wire xfers, or use suppliers from abroad by creating phony invoices, using C-Team fraud, compromising their email accounts, or impersonating an attorney or trusted person.

A

Business email compromise (BEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of information can be attained from Dumpster Diving?

A

Credit card info
Receipts
IP Address Lists
Important Names
Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the goal of an attacker who uses impersonation to gather data an a person in order to attempt further cyber attacks?

A

Eliciting Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing that uses SMS as a vector

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the best way to mitigate and prevent Social Engineering attacks?

A

Proper employee training and awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a web server called that has been compromised and is being used to target web traffic in order to deploy malware or collect data?

A

Watering Hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This type of attack involves somebody closely following an authorized person into a physical area secured by a badge reader or keypad

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of campaign, also known as a misinformation operation, involves collecting tactical information, determining key stakeholders, and launching propaganda campaigns, often to gain a competitive advantage

A

Influence Campaigns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of information will an attacker gather when performing reconnaisance for a phishing attack?

A

Workplace

Bank info

Financial Transactions

Family and friends

17
Q

What do you call a threat that doesn’t actually exist but could be elicited as being true, resulting the in the waste of organization resources and time?

A

Hoax

18
Q

Phishing that targets a specific person or group of people within an organization

A

Spear Phishing

19
Q

What are some of the biggest reasons that social engineering is an effective attack vector?

A

Lack of initial and continual employee training
Weak or out-of-date AUPs
Poor perimeter controls

20
Q

A user types www.gooogle.com into their address bar and get redirected to a malicious website that freezes up their browser and warns that their computer has been infected. What type of attack is this?

A

Typosquatting
URL Hijacking
Sting Site
Fake URL

21
Q

Unsolicited email, Trackback, negative SEO attacks, spiders, and malware warnings are all categories of what type of attack?

A

Spam

22
Q

This type of scam involves a false email from a seemingly reputable entity or a high-level manager requesting a payment and may even include a link to a “pay” website.

A

Invoice Scam