Which of the following attack types is this?
Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone number
displayed on the caller ID matches the vendor’s number. When the purchasing agent asks to call the
vendor back, they are given a different phone number with a different area code.
Which of the following attack types is this?
Which of the following is the BEST action for the administrator to take?
A database administrator receives a call on an outside telephone line from a person who states that they
work for a well-known database vendor. The caller states there have been problems applying the newly
released vulnerability patch for their database system, and asks what version is being used so that they
can assist. Which of the following is the BEST action for the administrator to take?
Which of the following is the administrator using to gain access to the server room?
A security administrator forgets their card to access the server room. The administrator asks a coworker if
they could use their card for the day. Which of the following is the administrator using to gain access to
the server room?
Which of the following attacks occurred LAST?
Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to the
building. Sara then calls the helpdesk and informs them that their PIN no longer works and would like to
change it. Which of the following attacks occurred LAST?
Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarc
Which of the following is characterized by an attacker attempting to map out an organization’s staff
hierarchy in order to send targeted emails?
Which of the following attacks targets high level executives to gain company information?
Which of the following attacks targets high level executives to gain company information?
This is an example of.
Users are encouraged to click on a link in an email to obtain exclusive access to the newest version of a
popular Smartphone. This is an example of.
Which of the following is this an example of?
A computer supply company is located in a building with three wireless networks. The system security
team implemented a quarterly security scan and saw the following.
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?
Which of the following wireless attacks would this address?
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented
a security control to limit the connecting MAC addresses to a single port. Which of the following wireless
attacks would this address?
Which of the following should the technician do?
Users have been reporting that their wireless access point is not functioning. They state that it allows
slow connections to the internet, but does not provide access to the internal network. The user provides
the SSID and the technician logs into the company’s access point and finds no issues. Which of the
following should the technician do?