• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back


Social Engineering Attacks

11

Social Engineering Targets

11

Spoofing

Human-based software attack used to conceal identity. Can occur in:



  • Internet Protocol addresses
  • Network adapter hardware
  • MAC addresses
  • Email, wherein message headers are changed to conceal originator's identity

Impersontation

Human-based attack where attacker pretends to be someone they're not. Successful in situations where:



  • Identity can't be easily established.
  • There are no procedures in place to verify personnel or vendor operators

Hoax

Email or web-based attack

Phishing

11

Vishing

11

Whaling

11

URL Hijacking

11

Spam/Spim

11

Shoulder Surfing

11


Dumpster Diving

11

Tailgating

11