New Activity
Play Froggy Jumps
1. A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
A
Snooping
B
Wiretapping
C
Social Engineering
2. The passive gathering of information about a potential victim
A
Email Attack
B
Pretexting
C
Reconnaissance
3. Attempting to secretively discover private information about a person, company, or other entity.
A
Snooping
B
Wiretapping
C
Social Engineering
4. Exploiting a victim using email messages.
A
Reconnaissance
B
Pretexting
C
Email Attack
5. The use of deception to gain personal and/or private information for unlawful purposes.
A
Snooping
B
Wiretapping
C
Social Engineering
6. An attempt to connect to a server by capturing and resending authentication information.
A
Man-in-the-Middle Attack
B
Browser Attack
C
Replay Attack
7. An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.
A
Password Attack
B
Malware
C
Denial of Service
8. Tricking a victim into revealing sensitive information under false pretenses
A
Reconnaissance
B
Pretexting
C
Email Attack
9. Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
A
Browser Attack
B
Replay Attack
C
Email Attack
10. An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
A
Man-in-the-Middle Attack
B
Browser Attack
C
Denial of Service
11. An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
A
Password Attack
B
Malware
C
Denial of Service