Which of the following does this prevent?
Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
Which of the following does this prevent?
Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
Which of the following attacks does this action remediate?
Physical documents must be incinerated after a set retention period is reached. Which of the
following attacks does this action remediate?
Which of the following does this describe?
At the outside break area, an employee, Ann, asked another employee to let her into the building
because her badge is missing. Which of the following does this describe?
Which of the following does this describe?
At the outside break area, an employee, Ann, asked another employee to let her into the building
because her badge is missing. Which of the following does this describe?
Which of the following does this procedure prevent?
Pete’s corporation has outsourced help desk services to a large provider. Management has
published a procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing
the technician to work on their PC. Which of the following does this procedure prevent?
Which of the following attack types is this?
Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone
number displayed on the caller ID matches the vendor’s number. When the purchasing agent asks
to call the vendor back, they are given a different phone number with a different area code.
Which of the following attack types is this?
Which of the following is the BEST action for the administrator to take?
A database administrator receives a call on an outside telephone line from a person who states
that they work for a well-known database vendor. The caller states there have been problems
applying the newly released vulnerability patch for their database system, and asks what version is
being used so that they can assist. Which of the following is the BEST action for the administrator
to take?
Which of the following is the administrator using to gain access to the server room?
A security administrator forgets their card to access the server room. The administrator asks a
coworker if they could use their card for the day. Which of the following is the administrator using
to gain access to the server room?
Which of the following attacks occurred LAST?
Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to
the building. Sara then calls the helpdesk and informs them that their PIN no longer works and
would like to change it. Which of the following attacks occurred LAST?