1.
A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
A
Snooping
B
Wiretapping
C
Social Engineering
2.
The passive gathering of information about a potential victim
A
Email Attack
B
Pretexting
C
Reconnaissance
3.
Attempting to secretively discover private information about a person, company, or other entity.
A
Snooping
B
Wiretapping
C
Social Engineering
4.
Exploiting a victim using email messages.
A
Reconnaissance
B
Pretexting
C
Email Attack
5.
The use of deception to gain personal and/or private information for unlawful purposes.
A
Snooping
B
Wiretapping
C
Social Engineering
6.
An attempt to connect to a server by capturing and resending authentication information.
A
Man-in-the-Middle Attack
B
Browser Attack
C
Replay Attack
7.
An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.
A
Password Attack
B
Malware
C
Denial of Service
8.
Tricking a victim into revealing sensitive information under false pretenses
A
Reconnaissance
B
Pretexting
C
Email Attack
9.
Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
A
Browser Attack
B
Replay Attack
C
Email Attack
10.
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
A
Man-in-the-Middle Attack
B
Browser Attack
C
Denial of Service
11.
An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.