J.Dion Sec. 5 Social Engineering Flashcards

(39 cards)

1
Q

Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 main types social engineers use?

A

Authority
Urgency
Social proof
Scarcity
Likability
Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The power or right to give orders, make decisions, and enforce obedience.

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions.

A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Psychological phenomenon where individuals look to the behaviors and actions of other to determine their own decisions or actions in similar situations.

A

Social proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply.

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is associated with being nice, friendly, and socially accepted by others.

A

Likability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening.

A

Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four main forms of impersonation used by attackers?

A

Impersonation
Brand impersonation
Typosquatting
Watering Hole Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Specific form of impersonation where an attacker pretends to represent a legitimate company or brand.

A

Brand Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical error.

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Typosquatting is also known as 2 other names

A

URL hijacking
Cyber-squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use.

A

Watering hole attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 6 types of phishing attacks?

A

Phishing
Vishing
Smishing
Whaling
Spear phishing
Business email compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords and credit card numbers.

17
Q

Used by cybercriminals who are more tightly focused on a specific group of individuals or organizations.

A

Spear phishing

18
Q

“Spray and pray” mode?

19
Q

Targeted users mode?

A

Spear phishing

20
Q

Form of spear phishing that targets high-profile individuals like CEOs or CFOs.

21
Q

Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker.

A

Business email compromise (BEC)

22
Q

Phone-based attack in which the attacker deceives victims into divulging personal or financial information.

A

Vishing (Voice phishing)

23
Q

Attack that uses text messages to deceive individuals into sharing their person information.

A

Smishing (SMS phishing)

24
Q

Vital tool for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training.

A

Anti-phishing compaign

24
Manipulating a situation or creating a distraction to steal valuable items or information.
Diversion theft
24
This type of attack, the attacker manipulates the DNS server settings, so that when a user types a legitimate website URL they are redirected to a fake website.
DNS spoofing
24
Malicious deception that is often spread through social media, email, or other communication channels.
Hoax
25
What two types of attack are hoaxes usually paired with?
Phishing attacks Impersonation attacks
26
Looking over someone's shoulder to gather personal information.
Shoulder surfing
27
Virtual or physical searching through trash to find valuable information.
Dumpster diving
28
The process of secretly listening to private cnonversations.
Eavesdropping
29
What type of attack is paired with eavesdropping?
On the path attack
30
Planting a malware-infected device for a victim to find and unintentionally introduce malware to their organization's system.
Baiting
31
Which of the following types of phishing attacks is used to specifically target high-level executives or important officials within an organization? a. Phishing b. Whaling c. Spear phishing d. Impersonation
b. Whaling
32
During an anti-phishing campaign, what primary action should a company take after simulating a successful phishing attack on its employees? a. Terminate the employees who fall for the simulated attack. b. Send a warning email to all employees so they will be aware of phishing as a problem. c. Provide remedial training to all employees who fell for the attack.
c. Provide remedial training to all employees who fell for the attack. The primary goal of the campaign is to raise awareness.
33
Which social engineering technique involves searching through a target's trash or discarded items to obtain sensitive or valuable information? a. Diversion theft b. Shoulder surfing c. Eavesdropping d. Dumpster diving
d. Dumpster diving
34
Which social engineering attack involves an attacker creating a fabricated scenario to manipulate or deceive someone into divulging confidential information? a. Pretexting b. Dumpster diving c. Shoulder surfing d. Eavesdropping
a. Pretexting Form of social engineering where attackers create a scenario or pretext to manipulate/deceive someone into sharing confidential information.
35
Which of the following is a common motivational trigger used in social engineering attacks to manipulate victims to act or respond without taking time to think about the consequences? a. Likability b. Authority c. Urgency d. Social proof
c. Urgency
36