2.3 Malware Detection, Removal and Prevention Flashcards

1
Q

Define social engineering

A

Any attempt to manipulate users to reveal confidential information or perform actions detrimental to a system’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

A social engineering attack where the malicious actor communicates with he victim from a supposedly reputable source to lure the victim into divulging sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can the response rate be up to for generic phishing campaigns?

A

60-70% (with good grammar)
30-40% (with bad grammar)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spearphishing

A

A more targeted version of phishing using mainly the same techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whaling

A

Focused on key executives within an organisation or other key leaders, executives and managers in the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most effective form of phishing in a pentest?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smishing

A

Phishing over SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vishing

A

Message being communicated to the target using the voice functions of a telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BEC

A

An attacker takes over or impersonates a high-level executive’s email account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Tricking users into divulging private information by redirecting a victim to a website controlled by the attacker of pentester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can attackers execute pharming?

A

Redirects, popups, URL masking, background processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly