Which of the following does this prevent?
Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
which of the following attacks?
Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer
information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from which
of the following attacks?
Which of the following attacks does this action remediate?
All executive officers have changed their monitor location so it cannot be easily viewed when passing by their
offices. Which of the following attacks does this action remediate?
Which of the following attacks has MOST likely taken place?
An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in a public
area overlooking several Automatic Teller Machines (ATMs). It is also believed that user accounts belonging to
ATM operators may have been compromised. Which of the following attacks has MOST likely taken place?
Which of the following forms of social engineering woul…
Ann an employee is visiting Joe, an employee in the Human Resources Department. While talking to Joe, Ann
notices a spreadsheet open on Joe’s computer that lists the salaries of all employees in her department. Which
of the following forms of social engineering would BEST describe this situation?
Using proximity card readers instead of the traditional…
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Which of the following would BEST describe this type of…
A recent spike in virus detections has been attributed to end-users visiting www.compnay.com. The business
has an established relationship with an organization using the URL of www.company.com but not with the site
that has been causing the infections. Which of the following would BEST describe this type of attack?
Which of the following technical controls must be imple…
A security administrator must implement all requirements in the following corporate policy: Passwords shall be
protected against offline password brute force attacks. Passwords shall be protected against online password
brute force attacks. Which of the following technical controls must be implemented to enforce the corporate
policy? (Choose three.)
Which of the following can be used by a security admini…
Which of the following can be used by a security administrator to successfully recover a user’s forgotten
password on a password protected file?
Which of the following would BEST deter an attacker try…
Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to access an
account at a bank teller machine?