MOD 15 Flashcards

1
Q

What is the psychological manipulation of people to give confidential information?

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Cialdini’s 6 Principles of Influence?

A

1) Reciprocity
2) Commitment
3) Social proof
4) Authority
5) Liking
6) Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which principle of influence focuses on people returning favors (free samples) and the good cop/bad cop strategy?

A

Reciprocity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which principle of influence states that if people commit to an idea/goal in writiing, they’re more likely to commit to it? (Pop-ups that close by saying “I’ll sign up later)

A

Commitment / consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which principle of influence states that people will do things they see other people doing?

A

Social proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which principle of influence states that people tend to obey authority figures despite questionable requests? (email from IRS means more likely to respond?)

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which principle of influence states that people are easily persuaded by people they like? (viral marketing)

A

Liking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which principle of influence states that percieved scarcity will generate demand? (“Limited Time Only” sales)

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is it called when people believe others are telling the truth more often than they actually are?

A

Truth Bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the opposite of Truth Bias?

A

Lie Bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a criminal practice that gets access to private, personal, and financial information from the public using a telephone system?

A

Vishing (voice phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a technique of fraudulently obtaining private information? (fake email that looks legit)

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the act of using SMS text messaging to lure victims into a course of action?

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when pretending to be another person to gain physical access to a system or building?

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the act of creating and using prior research on the victim and a invented scenario so the targeted victim will give information?

A

pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does vishing use to create a legitimate sounding copy of an institution’s interactive voice response system?

A

rouge interactive voice response (IVR)

17
Q

Which technique is similar to phishing except it focuses on sending highly customized emails to a few users?

A

Spear Phishing

18
Q

What is the success rate for a spear-phishing attack?

A

50%

19
Q

What is the success rate for a phishing atttack?

A

5%

20
Q

Spear phishing success is heavily dependent on the amount of quality of __________ that the attacker can obtain.

A

Open Source Intelligence (OSINT)

21
Q

What is a targeted strategy that takes advantage on the trust users have in websites they regularly visit?

A

Water Holing

22
Q

Which attack is similar to the real-world Trojan Horse that leaves infected physical media for victims to find?

A

Baiting

23
Q

Which attack pretends to “help” a company with a problem, only to have the user type in commands which gives the attacker access to malware?

A

Quid Pro Quo

24
Q

Which attack gains access to restricted areas by walking behind someone who has access?

A

Tailgating

25
Q

Which SE countermeasure trains employees in security protocols?

A

Training to Employees

26
Q

Which SE countermeasure creates frameworks of trust for an employee’s level? (how/when/where sensitive information should be handled)

A

Standard Framework

27
Q

Which SE countermeasure identifies which information is sensitive to social engineering and breakdowns?

A

Scrutinizing Information

28
Q

Which SE countermeasure establisshes security protocols, policies, and procedures for handling sensitive informatiion?

A

Security Protocols

29
Q

Which SE Countermeasure performs unannounced tests of the security framework?

A

Event Test

30
Q

Which SE Countermeasure prevents social engineering tricks/traps by creating a resistance to them?

A

Inoculation

31
Q

Which SE Countermeasure reviews the other countermeasures regularly?

A

Review

32
Q

Which SE Countermeasure uses a waste management serve with locks on them?

A

Waste Management