This is an example of.
Users are encouraged to click on a link in an email to obtain exclusive access to the newest version of a
popular Smartphone. This is an example of.
Which of the following attacks targets high level execu…
Which of the following attacks targets high level executives to gain company information?
Which of the following is characterized by an attacker …
Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in
order to send targeted emails?
Which of the following attacks occurred LAST?
Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to the building.
Sara then calls the helpdesk and informs them that their PIN no longer works and would like to change it.
Which of the following attacks occurred LAST?
Which of the following is the administrator using to ga…
A security administrator forgets their card to access the server room. The administrator asks a coworker if they
could use their card for the day. Which of the following is the administrator using to gain access to the server
room?
Which of the following is the BEST action for the admin…
A database administrator receives a call on an outside telephone line from a person who states that they work
for a well-known database vendor. The caller states there have been problems applying the newly released
vulnerability patch for their database system, and asks what version is being used so that they can assist.
Which of the following is the BEST action for the administrator to take?
Which of the following attack types is this?
Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone number
displayed on the caller ID matches the vendor’s number. When the purchasing agent asks to call the vendor
back, they are given a different phone number with a different area code.
Which of the following attack types is this?
Which of the following does this procedure prevent?
Pete’s corporation has outsourced help desk services to a large provider. Management has published a
procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing the technician
to work on their PC. Which of the following does this procedure prevent?
Which of the following does this describe?
At the outside break area, an employee, Ann, asked another employee to let her into the building because her
badge is missing. Which of the following does this describe?
Which of the following attacks does this action remediate?
Physical documents must be incinerated after a set retention period is reached. Which of the following attacks
does this action remediate?