CompTIA Exam Questions

When questioned, she denies any knowledge of it, but informs

While performing a routing site audit of your wireless network, you discover an unauthorized Access Point placed on your network under the desk of Accounting department security. When questioned, she denies any knowledge of it, but informs

A.
SYN Flood.

B.
Distributed Denial of Service.

C.
Man in the Middle attack.

D.
TCP Flood.

E.
IP Spoofing.

F.
Social Engineering

G.
Replay attack

H.
Phone tag

I.
Halloween attack

Explanation:
Social engineering is a process where an attacker attempts to acquire information about your network and system by talking to people in the organization. A social engineering attack may occur over the phone, be e-mail, or by a visit.
Reference: Security + (SYBEX) page 87