Study online at https://quizlet.com/_e06e1h
1. What type of ma- The Love Letter attack was an example of social engineering. Social engineering
nipulation tech- is a manipulation technique that exploits human error to gain private information,
nique was the access, or valuables.
LoveLetter at-
tack?
2. What are the Business Email Compromise (BEC)
5 most common Spear phishing
phishing attacks Whaling
Vishing
Smishing
3. What are the Viruses
5 most common Worms
Malware attacks Ransomware
Spyware
4. What are the Social media Phishing
5 most common Watering hole attack
Social engineer- USB baiting
ing attacks Physical Social engineering
5. Why are social Authority: Threat actors impersonate individuals with power. This is because peo-
engineering at- ple, in general, have been conditioned to respect and follow authority figures.
tacks so effective Intimidation: Threat actors use bullying tactics. This includes persuading and
intimidating victims into doing what they're told.
Consensus/Social proof: Because people sometimes do things that they believe
many others are doing, threat actors use others' trust to pretend they are legiti-
mate. For example, a threat actor might try to gain access to private data by telling
an employee that other people at the company have given them access to that data
in the past.
Scarcity: A tactic used to imply that goods or services are in limited supply.
1/7
, Cybersecurity Course 1 Module 2 Questions
Study online at https://quizlet.com/_e06e1h
Familiarity: Threat actors establish a fake emotional connection with users that can
be exploited.
Trust: Threat actors establish an emotional relationship with users that can be
exploited over time. They use this relationship to develop trust and gain personal
information.
Urgency: A thr
6. A computer virus code
is malicious _____
that interferes
with computer
operations and
causes damage.
7. What is one way The Morris worm helped shape the security industry because it led to the devel-
that the Mor- opment of computer emergency response teams, now commonly referred to as
ris worm helped computer security incident response teams (CSIRTs).
shape the securi-
ty industry?
8. What were the The key impacts of the Equifax breach were the fact that millions of customers' PII
key impacts was stolen and that the significant financial consequences of a breach became
of the Equifax more apparent.
breach?
9. Social engineer- False; relies on user error
ing, such as
phishing, is a ma-
nipulation tech-
nique that relies
on computer er-
ror to gain pri-
vate information,
2/7