Social Engineering Flashcards

(34 cards)

1
Q

Targeted form of Cyber attack where attackers compromise a specific website or service that their target is known to use

A

Watering Hole Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A form of Cyber attack where an attacker registers a domain name that is similar to a popular website but contains some common typographical error

A

Typosquating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Specific form of impersonation where an attacker pretends to represent a legitimate company or brand

A

Brand Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack where an adversary assumes the identity of another person to gain unauthorized access to resources of steal sensitive data

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The power or right to give orders, make decisions, and enforce obedience

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly to prioritize certain actions

A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations

A

Social Proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Psychonological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is associated with being nice, friendly, and socially accepted by others

A

Likeability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening

A

Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fraudulent attack using deceptive emails from trusted source to trick individuals into disclosing personal information like passwords, and credit card numbers

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used by cybercriminals who are more tightly focused on a specific group of individuals or organizations

A

Spear Fishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Form of spear fishing that targets high-profile individuals, like CEOs or CFOs.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advanced fishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attackers

A

Business Email Compromise (BEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phone-based attack in which the attacker deceives victims into divulging personal or finacial information

A

Vishing (Voice Phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack that uses text messages to deceive individuals into sharing their personal information

A

Smishing (SMS Phishing)

17
Q

Vital tool for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training

A

Anti-phishing Campaign

18
Q

Email with “broken English,” poor grammar, or multiple spelling errors are often a phishing campaign

A

Poor Grammar and Spelling

19
Q

Phishing emails induce urgency by pushing recipients to take immediate action

20
Q

Appraoching emails requesting sensitive information with high suspicion and caution

A

Unusual Requests

21
Q

In HTML-based emails, the visible text is the display text, while the underlying URL of a web link can be manipulated

A

Mismatched URLs

22
Q

Always verify the sender’s email address when receiving an email

A

Strange Email Address

23
Q

The wrongful or criminal deception intended to result in financial or personal gain

24
Q

The use by one person of another person’s personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person

A

Identity Fraud

25
A fraudulent or deceptive act or operation
Scam
26
A scam in which a person is tricked into paying for a fake invoice for a service or product that they did not order
Invoice Scam
27
Inaccurate information shared unintentionally
Misinformation
28
Intentionally spread of false information to deceive or mislead
Disinformation
29
Manipulating a situation or creating a distraction to steal valuable itemsof information
Diversion Theft
30
Looking over someone's shoulder to gather personal information
Shoulder Surfing
31
Searching through trash to find valuable information
Dumpster Diving
32
The process of secretly listening to private conversations
Eavesdropping
33
Planting a mature-infected device for a victim to find and unintentionally introduce malware to their organization's system
Baiting
34
Both involved unauthorized person following an authorized person into a secure area
Piggybacking and taigating