Which of the following would BEST describe this type of attack?
A recent spike in virus detections has been attributed to end-users visiting www.compnay.com. The
business has an established relationship with an organization using the URL of www.company.com but
not with the site that has been causing the infections. Which of the following would BEST describe this
type of attack?
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Which of the following forms of social engineering would BEST describe this situation?
Ann an employee is visiting Joe, an employee in the Human Resources Department. While talking to Joe,
Ann notices a spreadsheet open on Joe’s computer that lists the salaries of all employees in her
department. Which of the following forms of social engineering would BEST describe this situation?
Which of the following attacks has MOST likely taken place?
An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in a public
area overlooking several Automatic Teller Machines (ATMs). It is also believed that user accounts
belonging to ATM operators may have been compromised. Which of the following attacks has MOST
likely taken place?
Which of the following attacks does this action remediate?
All executive officers have changed their monitor location so it cannot be easily viewed when passing by
their offices. Which of the following attacks does this action remediate?
which of the following attacks?
Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer
information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from
which of the following attacks?
Which of the following does this prevent?
Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
Which of the following attacks does this action remediate?
Physical documents must be incinerated after a set retention period is reached. Which of the following
attacks does this action remediate?
Which of the following does this describe?
At the outside break area, an employee, Ann, asked another employee to let her into the building
because her badge is missing. Which of the following does this describe?
Which of the following does this procedure prevent?
Pete’s corporation has outsourced help desk services to a large provider. Management has published a
procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing the
technician to work on their PC. Which of the following does this procedure prevent?