Social Engineering
Common Attacks
Networks
Threat Actors
Enterprise Security
100

An illegal activity that accounts for 98% of cyber-attacks.

What is social engineering?

100

This attack redirects your traffic and then passes it on to the destination?

What is a man-in-the-middle attack?

100
This protocol allows a computer to obtain an IP address using MAC address.

What is Address Resolution Protocol (ARP)?

100

These threat actors are people you normally trust such as employees.

What are insider threats?

100
Similar to vulnerability scanning, this practice tried to exploit vulnerabilities in systems?

What is pen testing?

200

Over 70% of data breaches start with this type of attack.

What is phishing? What is social engineering?

200

This attack can cause a system to be unavailable and may be a smokescreen for another attack.

What is a Denial of Service attack?

200

This is a hardware address assigned to a network card by the manufacturer and should be unique across all devices. 

What is a MAC address?

200

These threat actors have the backing of government and often operate with high degrees of sophistication.

What are nation states?

200

This is often the first step of an attack used to gather information needed to carry out the attack.

What is reconnaissance?

300

When an attacker will register a domain similar to an official one and hope that a targeted user does not notice the misspelling.

What is a spoofed sender address?

300

When incoming call information is faked.

What is Caller ID spoofing?

300

This attack can result in a bad actor having access to your domain registration.

What is Domain hijacking?

300

These are malicious actors that are promoting social change or a political agenda.

What are hacktivists?

300

This uses information gathered from many publicly available resources. There are automated tools available to help gather information.

What is Open Source Intelligence (OSINT)?

400

Attackers use text messages and voice-changing software to send SMS messages or robo-call users.

What is Vishing and/or Smishing?

400

The process of gaining higher-level access to a system.

What is privilege escalation?

400

This network device allows users to connect to a network wirelessly.

What is an access point?

400

These actors are not sophisticated and usually run pre-made scripts with limited knowledge of how they work.

What are script kiddies?

400

Confidentiality, Integrity, Available

What is the CIA Triad?

500

This form of social engineering attack involves targeting certain groups by infecting websites that the group is likely to visit.

What is a watering hole?

500

This is a vulnerability has not been detected or published.

What is a zero day attack? 

500

This network protocol allows a device to obtain an IP Address and DNS information without it being manually defined.

What is Dynamic Host Control Protocol (DHCP)?

500

These malicious actors are professional criminals. They're motivated by money and often use ransomware. 

What is organized crime?

500

All application instances must follow this established standard.

What is a baseline configuration?

M
e
n
u