ZEE Flashcards
(30 cards)
What is social engineering in the context of computer science?
Social engineering is the manipulation of individuals to gain confidential information or access to systems.
True or False: Social engineering attacks rely solely on technical skills.
False
Fill in the blank: Social engineering exploits __________ rather than technology.
human psychology
What is the primary goal of a social engineering attack?
To obtain sensitive information or access to systems.
Name one common technique used in social engineering.
Phishing
Multiple Choice: Which of the following is NOT a type of social engineering attack? A) Phishing B) Vishing C) Hacking D) Pretexting
C) Hacking
What is phishing?
Phishing is a method of trying to gather personal information using deceptive emails and websites.
True or False: Pretexting involves creating a fabricated scenario to obtain information.
True
What is vishing?
Vishing is voice phishing, where attackers use phone calls to trick individuals into revealing information.
Fill in the blank: __________ is a social engineering technique where attackers impersonate someone in authority.
Impersonation
What is baiting in social engineering?
Baiting involves offering something enticing to lure victims into a trap.
Multiple Choice: Which of the following can be a target of social engineering? A) Individuals B) Organizations C) Both A and B D) None of the above
C) Both A and B
What role does trust play in social engineering attacks?
Trust is exploited to manipulate victims into providing information or access.
True or False: Social engineering attacks can be completely prevented with technical measures alone.
False
What is the importance of security awareness training?
It helps individuals recognize and respond appropriately to social engineering attempts.
Fill in the blank: __________ is the act of gathering information about a target before launching an attack.
Reconnaissance
What is shoulder surfing?
Shoulder surfing is the act of observing someone’s private information without their consent, typically by looking over their shoulder.
Multiple Choice: Which of the following is a sign of a potential social engineering attack? A) Urgent requests for information B) Unusual sender email addresses C) Both A and B D) None of the above
C) Both A and B
What should you do if you suspect a social engineering attack?
Report it to your IT department or security team.
True or False: All social engineering attacks are executed online.
False
What is the role of social media in social engineering?
Social media can provide attackers with personal information to craft more convincing attacks.
Fill in the blank: __________ is a technique where attackers trick victims into downloading malware disguised as legitimate software.
Malware distribution
What is the difference between social engineering and traditional hacking?
Social engineering relies on psychological manipulation, while traditional hacking relies on exploiting technical vulnerabilities.
Multiple Choice: Which of the following is a defensive measure against social engineering? A) Ignoring suspicious messages B) Verifying identities C) Sharing passwords D) None of the above
B) Verifying identities