PrepAway - Latest Free Exam Questions & Answers

How would you prevent such type of attacks?

If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of
business, they just have to find a job opening, prepare someone to pass the interview, have that
person hired, and they will be in the organization.

How would you prevent such type of attacks?

PrepAway - Latest Free Exam Questions & Answers

A.
It is impossible to block these attacks

B.
Hire the people through third-party job agencies who will vet them for you

C.
Conduct thorough background checks before you engage them

D.
Investigate their social networking profiles

4 Comments on “How would you prevent such type of attacks?

  1. Cosmo says:

    I’m not sure about this question.

    OK. It is possible to make background check, even to examine social network profile of a candidates and lot of companies would do so, but in real life there is always possibility to train (hire) anonymous from some distant town which will not be discovered. It is just matter of money.

    I would say that there is no way to prevent the attack (A), but it is possible to TRY to lower possibility of suffering damage.

  2. Don says:

    Ans C- conduct a thorough bacground check to the extend of signing the NDA and Insurance.
    A – while impossible to Block the attack, by following the Ans C would prevent from happening the attack
    D – a well-planned attack never reveal true identity of an attacker
    B – no assurance and Job agencies also prone to attack

  3. perimeterrunner says:

    A legal question. Each defensive tactic works in it’s own light. Limits are an acceptable level to an organization on some level. Is the possible weight important enough to the job importance to the company. Background checks have a trail of intent to verify to release liability. One’s social profile is as good of use as one posts it important. A third party uses scheme to outcome based on techniques yet, to what end are the techniques to the scheme manipulatable in vetting. Why such technique? Why so defensive? Why question at all? Where merely asking in vetting presumes more intention of misuse.


Leave a Reply