1_1_1 Section 1 – Attacks, Threats, and Vulnerabilities - Social Engineering -  Phishing

1_1_1 Section 1 – Attacks, Threats, and Vulnerabilities - Social Engineering - Phishing

Created by
@UnmatchedMandolin

Questions and Answers

What is the main purpose of phishing emails?

To gather personal information by mimicking trustworthy sources

How do phishing emails often deceive recipients?

By using social engineering and spoofing techniques

What is one way to identify a phishing attempt?

By observing unusual graphics on the webpage

What is a common feature of phishing emails when they ask recipients to click a link?

<p>The links will bring up a webpage that resembles the actual service provider's page</p> Signup and view all the answers

How can the true identity of a sender be verified in an email?

<p>By validating the sender's email address separately</p> Signup and view all the answers

What should recipients do when encountering suspicious links in emails?

<p>Validate any link before clicking on it</p> Signup and view all the answers

What is one of the main recommendations to avoid falling for phishing attacks?

<p>Typing the website directly in the browser's address bar</p> Signup and view all the answers

What is a common technique used by attackers to make phishing pages look legitimate?

<p>Adding typos or slight misspellings to domain names</p> Signup and view all the answers

What is an example of a phishing technique mentioned in the text?

<p>Creating pretexting scenarios to deceive recipients</p> Signup and view all the answers

What is pharming, as described in the text?

<p>Redirecting users from legitimate websites to attacker-controlled sites</p> Signup and view all the answers

How do attackers make malicious websites appear legitimate according to the text?

<p>Creating domain names with subtle spelling mistakes</p> Signup and view all the answers

What danger is associated with falling for a pharming attack?

<p>Unknowingly providing personal information to attackers</p> Signup and view all the answers

What is the purpose of pretexting in phishing attacks?

<p>Creating deceptive scenarios to trick individuals into giving up information</p> Signup and view all the answers

How does typing a website directly in the browser's address bar help prevent phishing attacks?

<p>It bypasses potentially malicious links.</p> Signup and view all the answers

What could be a consequence of falling for a phishing attack involving pretexting?

<p>Unknowingly providing personal details to attackers.</p> Signup and view all the answers

How can attackers make illegitimate websites look convincing according to the text?

<p>Including spelling errors and typos in domain names.</p> Signup and view all the answers

What is the term for performing a phishing attack over a voice line?

<p>Vishing</p> Signup and view all the answers

In phishing attacks done over text messages, what is the term used to describe this method?

<p>Smishing</p> Signup and view all the answers

What type of phishing attack targets a specific person or group of individuals?

<p>Spear phishing</p> Signup and view all the answers

Where can many phishing scam examples be found according to the text?

<p>Reddit</p> Signup and view all the answers

In a whaling attack, who is often targeted due to their access to corporate bank accounts?

<p>The CEO</p> Signup and view all the answers

What is the goal of attackers in a whaling attack?

<p>Transfer money to personal accounts</p> Signup and view all the answers

What is the term used for a very directed phishing attack aimed at a specific person or group?

<p>Spear phishing</p> Signup and view all the answers

What is the primary goal of a phishing email?

<p>To gather personal information from the recipient</p> Signup and view all the answers

Why is it mentioned that attackers cannot alter the address bar in a phishing email?

<p>To emphasize the importance of checking the URL in emails</p> Signup and view all the answers

What visual cue can often reveal a phishing attempt when viewing a fake login page?

<p>Mismatched or poorly designed graphics</p> Signup and view all the answers

Why is it important for recipients to validate links in emails?

<p>To prevent falling victim to phishing attacks</p> Signup and view all the answers

What aspect of phishing pages can often seem 'not quite right' to the recipient?

<p>Subtle differences compared to legitimate sites</p> Signup and view all the answers

Why do attackers often combine social engineering with spoofing in phishing attacks?

<p>To improve the chances of tricking recipients into sharing information</p> Signup and view all the answers

What type of phishing attack involves going after a very specific person or group of people?

<p>Whaling</p> Signup and view all the answers

How do attackers gather information before performing a spear phishing attack?

<p>By performing reconnaissance steps</p> Signup and view all the answers

What is the term for a phishing attack conducted over SMS or text messages?

<p>Smishing</p> Signup and view all the answers

Which type of attack involves the attacker using phone numbers that appear local but can be from anywhere?

<p>Vishing</p> Signup and view all the answers

What is the main goal of attackers in a whaling attack?

<p>Gain access to corporate bank accounts</p> Signup and view all the answers

How can attackers make phishing attacks more believable in spear phishing and whaling scenarios?

<p>By gathering open-source information about the victims</p> Signup and view all the answers

In spear phishing, what is the purpose of gathering personal information about the victim?

<p>To create a believable pretext for the attack</p> Signup and view all the answers

What distinguishes a vishing attack from other types of phishing methods?

<p>It is done over voice lines through phone calls</p> Signup and view all the answers

What technique is commonly used by attackers in smishing attacks?

<p>Spoofing phone numbers</p> Signup and view all the answers

What is one common feature of smishing attacks?

<p>Using text messages with enticing links</p> Signup and view all the answers

What is one way attackers make phishing emails deceptive?

<p>By generating emails with poor grammar and spelling errors</p> Signup and view all the answers

What is a key aspect of pharming attacks discussed in the text?

<p>It redirects users to the attacker's website even when they type the correct URL</p> Signup and view all the answers

What is one common characteristic of phishing emails as mentioned in the text?

<p>Creating a sense of urgency or emergency to prompt action</p> Signup and view all the answers

How do attackers utilize typosquatting in phishing attacks?

<p>By creating fake domains closely resembling legitimate ones</p> Signup and view all the answers

What is an example of pretexting as described in the text?

<p>Claiming to be from a trusted organization to gather personal details</p> Signup and view all the answers

How do phishing attackers attempt to deceive individuals using pharming attacks?

<p>By redirecting users to fake websites that appear genuine</p> Signup and view all the answers

What is a common method attackers use to make phishing websites appear legitimate?

<p>'Spoofing' the domain name to closely resemble the real one</p> Signup and view all the answers

How can a user mistakenly end up on an attacker's website in a pharming attack?

<p>By typing the correct URL but falling for pretexting scams</p> Signup and view all the answers

How do attackers try to make phishing emails seem believable?

<p>Creating scenarios that instill panic or urgency in recipients</p> Signup and view all the answers

What do attackers achieve through typosquatting in phishing attacks?

<p>Tricking users into visiting fake domains similar to legitimate ones</p> Signup and view all the answers

More Quizzes Like This

Nätfiskequiz
10 questions

Nätfiskequiz

ViewableRhinoceros avatar
ViewableRhinoceros
Medidas de Seguridad contra el Phishing
10 questions
Phishing Attacks and Scams
10 questions
Phishing Attacks and Scams
10 questions
Use Quizgecko on...
Browser
Browser