PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks could be the most successful when the security technology is properly implement

Which of the following attacks could be the most successful when the security technology is
properly implemented and configured?

PrepAway - Latest Free Exam Questions & Answers

A.
Logical attacks

B.
Physical attacks

C.
Social Engineering attacks

D.
Trojan Horse attacks

Explanation:
Social Engineering attacks – In computer security systems, this type of attack is
usually the most successful, especially when the security technology is properly
implemented and configured. Usually, these attacks rely on the faults in human beings.
An example of a social engineering attack has a hacker impersonating a network service
technician. The serviceman approaches a low-level employee and requests their password
for network servicing purposes. With smartcards, this type of attack is a bit more
difficult. Most people would not trust an impersonator wishing to have their smartcard
and PIN for service purposes.


Leave a Reply