PrepAway - Latest Free Exam Questions & Answers

Which of the following does this prevent?

Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?

PrepAway - Latest Free Exam Questions & Answers

A.
Dumpster diving

B.
War driving

C.
Tailgating

D.
War chalking

Explanation:
The bins in this question will be secure bins designed to prevent someone accessing the `rubbish’ to learn sensitive information.
Dumpster diving is looking for treasure in someone else’s trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a
technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn’t limited to searching through the trash
for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational
chart can be used to assist an attacker using social engineering techniques to gain access to the network. To prevent dumpster divers from learning anything
valuable from your trash, experts recommend that your company establish a disposal policy where all paper, including print-outs, is shredded in a cross-cut
shredder before being recycled, all storage media is erased, and all staff is educated about the danger of untracked trash.
Incorrect Answers:
B: War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a
city or elsewhere. To do war driving, you need a vehicle, a computer (which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some
kind of an antenna which can be mounted on top of or positioned inside the car. Because a wireless LAN may have a range that extends beyond an office building,
an outside user may be able to intrude into the network, obtain a free Internet connection, and possibly gain access to company records and other resources.
Secure bins are not used to prevent war driving. Therefore, this answer is incorrect.
C: Tailgating in IT security would be an unauthorized person following and authorized person into a building or room such as a datacenter. If a building has a card
reader where an authorized person can hold up a card to the reader to unlock the door, someone tailgating could follow the authorized person into the building by
walking through the door before it closes and locks. Secure bins are not used to prevent tailgating. Therefore, this answer is incorrect.
D: War chalking is the act of making chalk marks on outdoor surfaces (walls, sidewalks, buildings, sign posts, trees) to indicate the existence of an open wireless
network connection, usually offering an Internet connection so that others can benefit from the free wireless access. The open connections typically come from the
access points of wireless networks located within buildings to serve enterprises. The chalk symbols indicate the type of access point that is available at that specific
spot. Secure bins are not used to prevent war chalking. Therefore, this answer is incorrect.

http://searchsecurity.techtarget.com/definition/dumpster-diving http://searchmobilecomputing.techtarget.com/definition/war-driving http://www.webopedia.com/
TERM/W/warchalking.html


Leave a Reply