Types Of Attacks Flashcards

1
Q

Phishing Attack

A

The hacker typically emails a user and pretends to be a representative from a bank or company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pharming

A

Is a term some people use for an attack on DNS or hosts files that lead an individual to the wrong site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spim

A

Typically, instant messenger IDs are learned by the hacker using a BOT. The BOT then sends the user an instant message asking the user to click the hyperlink sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spear Phishing

A

A type of phishing where the email message sent is spoofed and looks like it comes from a trusted source such as a fellow employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Tries to trick people and steal money from them. The contact is made with a phone call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whaling

A

The hacker sends the email to a specific person (the big fish) who may have a lot to lose from the attack. Usually an executive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Xmas

A

Scan gets it name by a packet being sent to each port with PSG,URG, and FIN flags set in the packet,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing Attacks

A

Is a type of attack where the hacker alters the source address of information to make the information look like it is coming from a different person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hoaxes

A

Are email messages that users receive giving a false story and asking the user to take some type of action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spam

A

Is sending the same unsolicited email message to a number of people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering attacks

A

Involves the hacker trying to trick someone into compromising security through social contact such s a phone call or email message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly