A+ 1201 2.5 social engineering attacks, threats, and vulnerabilities

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

What is it called when someone tries to view sensitive information by looking over your shoulder?

shoulder surfing

2
New cards

An employee receives an email pretending to be from their bank asking them to click a link and verify their account. What type of attack is this?

phishing

3
New cards

A victim gets a call from someone pretending to be IT support asking for their login credentials. What attack is happening?

vishing

4
New cards

A user receives a text message claiming they won a prize and must click a malicious link to claim it. What is this attack called?

smishing

5
New cards

A conference attendee scans a QR code posted on a wall, which redirects them to a fake login page. What kind of phishing attack is this?

qr code fishing

6
New cards

A targeted email is sent to a finance employee pretending to be from the CFO, asking for a wire transfer. What type of phishing is this?

spear phishing

7
New cards

An attacker targets the CEO with a fake invoice email that appears legitimate. What is this attack type?

whaling

8
New cards

An attacker follows an employee into a secure building by pretending they forgot their badge. What is this called?

tailgating

9
New cards

An attacker dresses as a delivery person to gain access to a secure floor. What social engineering tactic is used here?

impersonation

10
New cards

An attacker looks through discarded documents in a trash bin to find sensitive information. What attack is this?

dumpster diving

11
New cards

A company’s website becomes unavailable because a server is overwhelmed with fake traffic from a single source. What attack is happening?

DoS

12
New cards

A company’s website is taken offline because thousands of infected computers simultaneously flood it with traffic. What is this attack?

DDoS

13
New cards

A rogue Wi-Fi hotspot is set up to trick users into connecting to it, stealing their traffic. What type of threat is this?

Man in the middle

14
New cards

An attacker exploits a vulnerability in a program before the vendor releases a patch. What attack is this?

Zero Day

15
New cards

An attacker sends emails with forged sender addresses to look like they’re from a trusted source. What’s this attack called?

spoofing

16
New cards

An attacker secretly intercepts and modifies communication between a user and a server. What type of attack is this?

17
New cards

An attacker repeatedly tries thousands of passwords to break into an account. What’s this attack method called?

brute force

18
New cards

An attacker uses a dictionary of common words instead of random guesses to crack a password. What attack is this?

dictionary brute force

19
New cards

A trusted employee steals sensitive company data and sells it to competitors. What type of threat is this?

Insider threat

20
New cards

A web application is tricked into executing malicious SQL commands via a login form. What is this vulnerability called?

SQL injection

21
New cards
22
New cards
23
New cards
24
New cards