Social Engineering Flashcards

1
Q

Manipulates a user into revealing confidential information that are
detrimental to that user or the security of our systems

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A person who works for or with your organization but has ulterior
motives

A

Insider Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attempt to fraudulently obtain information from a user (usually by
email)

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attempt to fraudulently obtain information from a user, usually by
email that targets a specific individual

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A form of spear phishing that directly targets the CEO, CFO, CIO, CSO, or
other high-value target in an organization

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing conducted over text messaging (SMS)

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing conducted over voice and phone calls

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing attempt to trick a user to access a different
or fake website (usually by modifying hosts file)

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a thief attempts to take responsibility for a shipment by diverting
the delivery to a nearby location

A

DiversionTheft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attempt at deceiving people into believing that something is false when it
is true (or vice versa)

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a person uses direct observation to obtain authentication
information

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a person uses direct observation to “listen” in to a conversation

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a person scavenges for private information in garbage containers

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a malicious individual leaves malware-infected removable media
such as a USB drive or optical disc lying around in plain view

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When an unauthorized person tags along with an authorized person to
gain entry to a restricted area

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When an attacker figures out where users like to go, and places malware
to gain access to your organization

A

Watering Hole Attack

17
Q

The wrongful or criminal deception intended to result in financial or
personal gain

A

Fraud

18
Q

The use by one person of another person’s personal information, without
authorization, to commit a crime or to deceive or defraud that other
person or a third person

A

Identity Fraud

19
Q

A fraudulent or deceptive act or operation

A

Scam

20
Q

A scam in which a person is tricked into paying for a fake invoice for a
service or product that they did not order

A

Invoice Scan

21
Q

A technical method used in social engineering to trick users into entering
their username and passwords by adding an invisible string before the
weblink they click

A

Prepending

22
Q

The collection of tactical information about an adversary as well as the
dissemination of propaganda in pursuit of a competitive advantage over
an opponent

A

Influence Operations

23
Q

A military strategy which employs political warfare and blends
conventional warfare, irregular warfare and cyberwarfare with other
influencing methods, such as fake news, diplomacy, and foreign electoral
intervention

A

Hybrid Warfare

24
Q

Policy where all employees must put away everything from their desk at
the end of the day into locked drawers and cabinets

A

Clean Desk Policy