Which of the following attacks does this action remediate?
All executive officers have changed their monitor location so it cannot be easily viewed when passing by
their offices. Which of the following attacks does this action remediate?
which of the following attacks?
Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer
information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from
which of the following attacks?
Which of the following does this prevent?
Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
Which of the following attacks does this action remediate?
Physical documents must be incinerated after a set retention period is reached. Which of the following
attacks does this action remediate?
Which of the following does this describe?
At the outside break area, an employee, Ann, asked another employee to let her into the building
because her badge is missing. Which of the following does this describe?
Which of the following does this procedure prevent?
Pete’s corporation has outsourced help desk services to a large provider. Management has published a
procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing the
technician to work on their PC. Which of the following does this procedure prevent?
Which of the following attack types is this?
Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone number
displayed on the caller ID matches the vendor’s number. When the purchasing agent asks to call the
vendor back, they are given a different phone number with a different area code.
Which of the following attack types is this?
Which of the following is the BEST action for the administrator to take?
A database administrator receives a call on an outside telephone line from a person who states that they
work for a well-known database vendor. The caller states there have been problems applying the newly
released vulnerability patch for their database system, and asks what version is being used so that they
can assist. Which of the following is the BEST action for the administrator to take?
Which of the following is the administrator using to gain access to the server room?
A security administrator forgets their card to access the server room. The administrator asks a coworker if
they could use their card for the day. Which of the following is the administrator using to gain access to
the server room?
Which of the following attacks occurred LAST?
Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to the
building. Sara then calls the helpdesk and informs them that their PIN no longer works and would like to
change it. Which of the following attacks occurred LAST?