Cyber Defense 7.5.11
Using a fictitious scenario to persuade someone to perform an action or give information they aren't authorized to share is called which of the following?
Pretexting
Ron, a hacker, wants to gain access to a prestigious law firm he has been watching for a while. He has been going through the law firm's official website and social media. He's also been doing some dumpster diving outside the firm's office. Which phase of the social engineering process is Ron in?
Research phase
You are helping your manager with their computer. You need your manager to enter their username and password into the system. The manager enters the username and password while you are watching him. You explain to your manager that it is not a good idea to allow anyone to watch you type in usernames or passwords. Which type of social engineering attack are you referring to?
Shoulder surfing
A cybersecurity specialist is checking a link to a news article within a colleague's email. The email appears to be genuine, but the link is deliberately obscured. The specialist suspects that the link may be part of a social engineering attack that aims to exploit the organization's security vulnerabilities. What is the role of obfuscated links in social engineering attacks and their impact on IT security operations? (Select three.)
Social engineering attacks rely on human interaction to trick individuals into revealing sensitive information or performing actions that compromise network security. Social engineering attacks often use obfuscated links to redirect users to malicious websites that install malware or steal login credentials. Obfuscated links are hyperlinks intentionally obscured to hide the true destination of the link, often used in phishing attacks.
You are examining a company executive's laptop after they complained that someone was leaking confidential information to the internet. You type Ctrl+Alt+Shift+K and the following interface pops up. What has happened to the executive's machine?
Someone has installed a keylogger on it.
Which of the following indicate that the email highlighted below may be suspicious? (Select two.)
The link in the email is to an IP address; it is not to Microsoft's website. There are several spelling mistakes in the email.
You suspect that an https://www.newcompany.org/merchandise/jackets URL being used by some company employees has been masked to avoid pattern matching or simple visual inspection detection methods. Further investigation reveals that colons and slashes have been replaced with their URL encoded (hexadecimal) equivalents, %3A represents a colon (:) and %2F represents a period (.). You see the following: https%3A%2F%2Fwww.newcompany.org%2Fmerchandise%2Fjackets Which of the following URL obfuscation techniques is being used?
URL encoding
A security analyst is investigating a spear-phishing attack targeting their organization. They need to identify the key techniques the attacker used to deceive the victims into taking action. Which of the following techniques is MOST likely associated with this attack? (Select two.)
Impersonation Embedded links
An attacker has made a sales phone call to a target, and is currently performing an interview, allowing the target to do the talking while the attacker mostly listens. What is the next phase that the attacker will take to find out more information from the target?
Interrogation
Which of the following are tactics social engineers might use?
Moral obligation, ignorance, and threatening