Java Games: Flashcards, matching, concentration, and word search.

Advanced Cyber - Social Engineering Unit 6 | Study Guide

Enjoy Matching the Terms with the Words.

AB
Social ______ is the concept of using relationships, persuasion, and body language to steal some otherwise secretive/personal information or persuade someone to perform some action.Social Engineering
______ is meant to exploit a bias of obedience and compliance.Authority
What is another term for social proof?Consensus
What bias does social proof exploit?Following a Crowd
Trust exploits a bias of ______.Relationship
______ exploits a bias of the desire to be exclusive.Scarcity
What is Phishing?An attempt to gain sensitive information through electronic communication
What is Vishing short for?Voice Phishing
What does SPIM stand for?Spam over Internet Messaging
What is pharming?Putting malicious scripts onto network servers
Who was the chairman of Hillary Clintons 2016 campaign that had his email hacked?John Podesta
What is Shoulder Surfing?A type of social engineering technique used to obtain someone elses personal access information
What is the name given to an individual who secretly watches others in the privacy of their own homes?Peeping Tom
Which of the following terms is another name for tailgating?Piggybacking
What is a mantrap?A physical security system composed of a small space with two sets of interlocking doors
Which of the following is an example of attacking a victim as someone higher in rank?"Excuse me? I'm from the federal government"
Because impersonators may attempt to blend in by being overly friendly, it's important to verify the credentials of a visitor.True, impersonators can be sneakier than phishers
Which of the following is an example using prepending for malicious purposes?Adding "VERIFIED" to the beginning of the subject line of an email
What does PII stand for?Personally identifiable information
What is the name of the individual responsible for stealing over $80 million from individuals like Oprah, Warren Buffett, and Michael Bloomberg?Abraham Abdallah
Which real world cyberattacks was NOT an example of credential harvesting?2020 Twitter Bitcoin scam
What is the goal of a credential harvesting attack?Gain a victim's log-in credentials
What is reconnaissance?Gaining information by a preliminary survey
What is a hoax?A humorous or malicious deception
What is the name of a confirmed hoax?The Jackalope
What type of attack should an attacker use who wants to target websites that a group of end users use on a regular basis?Watering Hole Attack
Who is a watering hole attack targeting (directed towards)?Searchers or Common Users of a Website
What will an attacker develop to trick users during a watering hole attack?A Fake Website
Which type of sites do attackers target for a watering hole attack?Industry-related sites
When visitors visit a site used for a watering hole attack, how many users are affected?All visitors
One way to stop a watering hole attack is toUse anti-malware software
Before an attacker can exploit a website used by common users, he willTest for weaknesses
What is pretexting?When a malicious person goes to a victim trying to gain PII
Which of the following information is vulnerable to pretexting when signing a fake document?Address, Name and Phone Number
What is hybrid warfare?The combination of different war tactics
Which of the following is NOT a part of hybrid warfare?Decentralized Currency
Which of the following are part of hybrid warfare?Propaganda, Military Troops and SpecOps
What are influence campaigns very similar to?Propaganda


Computer Science & Technology Teacher
Union County High School
Blairsville, GA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities