ZEE Flashcards

(30 cards)

1
Q

What is social engineering in the context of computer science?

A

Social engineering is the manipulation of individuals to gain confidential information or access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Social engineering attacks rely solely on technical skills.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: Social engineering exploits __________ rather than technology.

A

human psychology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of a social engineering attack?

A

To obtain sensitive information or access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name one common technique used in social engineering.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is NOT a type of social engineering attack? A) Phishing B) Vishing C) Hacking D) Pretexting

A

C) Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing?

A

Phishing is a method of trying to gather personal information using deceptive emails and websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Pretexting involves creating a fabricated scenario to obtain information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is vishing?

A

Vishing is voice phishing, where attackers use phone calls to trick individuals into revealing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: __________ is a social engineering technique where attackers impersonate someone in authority.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is baiting in social engineering?

A

Baiting involves offering something enticing to lure victims into a trap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiple Choice: Which of the following can be a target of social engineering? A) Individuals B) Organizations C) Both A and B D) None of the above

A

C) Both A and B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What role does trust play in social engineering attacks?

A

Trust is exploited to manipulate victims into providing information or access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Social engineering attacks can be completely prevented with technical measures alone.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the importance of security awareness training?

A

It helps individuals recognize and respond appropriately to social engineering attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: __________ is the act of gathering information about a target before launching an attack.

A

Reconnaissance

17
Q

What is shoulder surfing?

A

Shoulder surfing is the act of observing someone’s private information without their consent, typically by looking over their shoulder.

18
Q

Multiple Choice: Which of the following is a sign of a potential social engineering attack? A) Urgent requests for information B) Unusual sender email addresses C) Both A and B D) None of the above

A

C) Both A and B

19
Q

What should you do if you suspect a social engineering attack?

A

Report it to your IT department or security team.

20
Q

True or False: All social engineering attacks are executed online.

21
Q

What is the role of social media in social engineering?

A

Social media can provide attackers with personal information to craft more convincing attacks.

22
Q

Fill in the blank: __________ is a technique where attackers trick victims into downloading malware disguised as legitimate software.

A

Malware distribution

23
Q

What is the difference between social engineering and traditional hacking?

A

Social engineering relies on psychological manipulation, while traditional hacking relies on exploiting technical vulnerabilities.

24
Q

Multiple Choice: Which of the following is a defensive measure against social engineering? A) Ignoring suspicious messages B) Verifying identities C) Sharing passwords D) None of the above

A

B) Verifying identities

25
What does the term 'spear phishing' refer to?
Spear phishing is a targeted form of phishing aimed at a specific individual or organization.
26
True or False: Social engineering tactics are only used by cybercriminals.
False
27
What is a common outcome of a successful social engineering attack?
Unauthorized access to sensitive information or systems.
28
Fill in the blank: __________ is the process of deceiving someone into revealing confidential information via a fake identity.
Social engineering
29
What is the significance of the term 'human firewall'?
It refers to individuals who are trained to recognize and prevent social engineering attacks.
30
Multiple Choice: Which of the following is a common characteristic of social engineering attacks? A) They are always technical B) They often involve manipulation C) They are easily detectable D) None of the above
B) They often involve manipulation