Phishing 2.2 Flashcards

1
Q

Phishing

A
  • Social engineering in which an attacker attempts to obtain sensitive information from users by masquerading as a trusted entity.f
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Email Compromise

A
  • Emails are highly trusted sources which attackers take advantage of.
  • Attackers can send spoofed email addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Typosquatting

A
  • An attack that capitalizes on common typographical errors.
  • Attackers register incorrect or mistyped URLs.
  • Used for a phishing attack or plant malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretexting

A
  • An attacker uses a narrative to influence the victim into giving up some item of information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A
  • An attack that uses voice communication technology to obtain the information the attacker is seeking.
  • Takes advantage of the trust that some people place on the telephone networking.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A
  • An attack using Short Message Service (SMS)
  • Involves directing the user to a URL that can potentially be use to download malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly