PrepAway - Latest Free Exam Questions & Answers

Tag: social engineering

What type of insider threat would Shayla be considered?

Shayla is an It security consultant, specializing in social engineering andexternal penetration tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense. Shayla has been given authority to perform any and all tests necessary to audit the company’s network security. No employees for the company, other than the IT director, know about Shayla’s work shewill be doing. Shayla’s first step is to obtain a list of employees through company website contact pages. Then she befriends a female employee of the company through an online chat website. After meeting with the female employee numerous times, Shayla is able to gain her trust and they become friends. One day, Shayla steals the employee’s access badge and uses it to gain unauthorized accessto the Treks Avionics offices. What type of insider threat would Shayla be considered?

What type of attack has Cindy used to gain access tothe network through the mobile devices?

Cindy is a certified ethical hacker working on contract as an IT consultantfor Dewdrop Enterprises, a computer manufacturing company based in Dallas. Dewdrop has many sales people that travel all over the state using Blackberry devices and laptops. These mobile devices are the company’s main concern as far as network security. About a year ago, one of the company laptops was stolen from asales person and sensitive company information was stolen from it. Because of this, the company has hired on Cindy to ensure that all mobile devices used by employees are secure. Since many of the employees are now using new laptops withWindows Vista, Cindy has configured Bitlocker on those devices for hard disk encryption. Cindy then uses the BlackBerry Attack Toolkit along with BBProxy to check for vulnerabilities on the blackberry devices. As it turns out, these devices are vulnerable and she is able to gain access to the corporate network throug h the Blackberry devices. What type of attack has Cindy used to gain access tothe network through the mobile devices?

What type of social engineering attack has Neil employed here?

Neil is an IT security consultant working on contract for Davidson Avionics. Neil has been hired to audit the network of Davidson Avionics. He has been given permission to perform any tests necessary. Neil has created a fake company ID badge and uniform. Neil waits by one of the company’s entrance doors and follows an employee into the office after they use their valid access card to gain entrance. What type of social engineering attack has Neil employed here?

If Heather is caught by the federal government, what law could she be prosecuted under?

Heather is a hackivist working for Green Peace International.She has broken into numerous oil and energy companies and exposed their confidential data to the public. Normally, Heather uses a combination of social engineering and DoS techniques to gain access to the companies’ networks.Heather has made over 50 fakes ID cards and access badges to gain unauthorized access to companies to gain information as well. If Heather is caught by the federal government, what law could she be prosecuted under?

What do you think is the reason behind this?

Sandra is conducting a penetration test for pass4sure.com. She knows that pass4sure.com is using wireless networking for some of the offices in the building right down the street. Through social engineering she discovers that they are using 802.11g. Sandra knows that 802.11g uses the same 2.4GHz frequency range as 802.11b. Using NetStumbler and her 802.11b wireless NIC, Sandra drives over to the building to map the wireless networks. However, even though she repositions herself around the building several times, Sandra is not able to detect a single AP.
What do you think is the reason behind this?

Your boss at pass4sure.com asks you what are the three stages of Reverse Social Engineering.

Your boss at pass4sure.com asks you what are the three stages of Reverse Social Engineering.

Sabotage, Advertising and Covering are the three stages of _____

Sabotage, Advertising and Covering are the three stages of _____


Page 1 of 212