Common_Security_Threats_and_Attacks Flashcards

(30 cards)

1
Q

What is phishing?

A

A social engineering attack where attackers trick users into revealing sensitive information through fake emails or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is spear phishing?

A

A targeted phishing attack aimed at a specific individual or organization using personalized information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is whaling?

A

A phishing attack targeting high-profile individuals such as executives or administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is vishing?

A

Voice phishing — attackers use phone calls or voicemail to trick users into revealing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is smishing?

A

SMS phishing — attackers send malicious or deceptive text messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is pretexting?

A

An attacker invents a scenario to trick someone into giving up information or access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is baiting?

A

Luring a victim with something appealing (like free software or USB drives) that contains malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tailgating?

A

An unauthorized person follows an authorized person into a secure area without proper credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is shoulder surfing?

A

Looking over someone’s shoulder to obtain sensitive information like passwords or PINs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is dumpster diving?

A

Searching through trash to find confidential information like passwords or documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a denial-of-service (DoS) attack?

A

An attack that floods a system or network with traffic to make it unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a distributed denial-of-service (DDoS) attack?

A

A coordinated DoS attack launched from many compromised systems (botnets).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a man-in-the-middle (MITM) attack?

A

An attacker intercepts communication between two parties to steal or alter information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DNS poisoning?

A

Altering DNS records to redirect users to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ARP poisoning?

A

Manipulating ARP tables to redirect network traffic to the attacker’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is session hijacking?

A

Taking control of a user’s active session to gain unauthorized access.

17
Q

What is privilege escalation?

A

Exploiting a flaw to gain higher access rights than intended.

18
Q

What is a zero-day attack?

A

An attack exploiting an unknown or unpatched vulnerability.

19
Q

What is brute-force attack?

A

An attacker tries every possible password or key until the correct one is found.

20
Q

What is dictionary attack?

A

An attacker uses a list of common passwords or words to guess credentials.

21
Q

What is rainbow table attack?

A

Using precomputed hashes to crack passwords faster.

22
Q

What is social engineering?

A

Manipulating people into performing actions or revealing confidential information.

23
Q

What is insider threat?

A

An employee or authorized user intentionally or accidentally causes harm to the organization.

24
Q

What is spoofing?

A

Impersonating another system, device, or user to trick others into trusting the attacker.

25
What is replay attack?
Capturing and reusing data packets (like login tokens) to impersonate a user.
26
What is clickjacking?
Tricking a user into clicking something different from what they perceive, often to perform unintended actions.
27
What is watering hole attack?
Compromising a website commonly visited by a target group to infect them with malware.
28
What is supply chain attack?
Infecting software or hardware during manufacturing or distribution to compromise many users downstream.
29
What is a rogue access point?
An unauthorized wireless access point that mimics a legitimate one to capture traffic.
30
What is evil twin attack?
A fake Wi-Fi access point set up to intercept data from unsuspecting users.