Which of the following attack types is this?
Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone
number displayed on the caller ID matches the vendor’s number. When the purchasing agent asks
to call the vendor back, they are given a different phone number with a different area code.
Which of the following attack types is this?
Which of the following is the BEST action for the administrator to take?
A database administrator receives a call on an outside telephone line from a person who states
that they work for a well-known database vendor. The caller states there have been problems
applying the newly released vulnerability patch for their database system, and asks what version is
being used so that they can assist. Which of the following is the BEST action for the administrator
to take?
Which of the following is the administrator using to gain access to the server room?
A security administrator forgets their card to access the server room. The administrator asks a
coworker if they could use their card for the day. Which of the following is the administrator using
to gain access to the server room?
Which of the following attacks occurred LAST?
Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to
the building. Sara then calls the helpdesk and informs them that their PIN no longer works and
would like to change it. Which of the following attacks occurred LAST?
Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarc
Which of the following is characterized by an attacker attempting to map out an organization’s staff
hierarchy in order to send targeted emails?
Which of the following attacks targets high level executives to gain company information?
Which of the following attacks targets high level executives to gain company information?
This is an example of.
Users are encouraged to click on a link in an email to obtain exclusive access to the newest
version of a popular Smartphone. This is an example of.
Which of the following is this an example of?
A computer supply company is located in a building with three wireless networks. The system
security team implemented a quarterly security scan and saw the following.
SSIDStateChannelLevel
Computer AreUs1connected170dbm
Computer AreUs2connected580dbm
Computer AreUs3connected375dbm
Computer AreUs4connected695dbm
Which of the following is this an example of?
Which of the following wireless attacks would this address?
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has
implemented a security control to limit the connecting MAC addresses to a single port. Which of
the following wireless attacks would this address?
Which of the following should the technician do?
Users have been reporting that their wireless access point is not functioning. They state that it
allows slow connections to the internet, but does not provide access to the internal network. The
user provides the SSID and the technician logs into the company’s access point and finds no
issues. Which of the following should the technician do?