Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Security+ 601 Quiz (McGraw-Hill Review Questions)

Beoordeling
-
Verkocht
-
Pagina's
110
Cijfer
A
Geüpload op
09-02-2022
Geschreven in
2021/2022

Security+ 601 Quiz (McGraw-Hill Review Questions)

Instelling
Vak

Voorbeeld van de inhoud

Security+ 601 Quiz (McGraw-Hill Review Questions)




Security+ 601
Quiz (McGraw-
Hill Review
Questions)

, Security+ 601 Quiz (McGraw-Hill Review Questions)

While waiting in the lobby of your building for a guest, you notice a man in a red shirt standing close
to a locked door with a large box in his hands. He waits for someone else to come along and open
the locked door and then proceeds to follow her inside. What type of social engineering attack have
you just witnessed?

A. Impersonation

B. Phishing

C. Boxing

D. Tailgating

D. Tailgating (or piggybacking) is the simple tactic of following closely behind a person who has just
used their own access card, key, or PIN to gain physical access to a room or building. The large box
clearly impedes the person in the red shirt's ability to open the door, so they let someone else do it
for them and follow them in.



A colleague asks you for advice on why he can't log in to his Gmail account. Looking at his browser,
you see he has typed www.gmal.com in the address bar. The screen looks very similar to the Gmail
login screen. Your colleague has just fallen victim to what type of attack?

A. Jamming

B. Rainbow table

C. Whale phishing

D. Typosquatting

D. Typosquatting capitalizes on common typing errors, such as gmal instead of gmail. The attacker
registers a domain very similar to the real domain and attempts to collect credentials or other
sensitive information from unsuspecting users.



A user in your organization contacts you to see if there's any update to the "account compromise"
that happened last week. When you ask him to explain what he means, and the user tells you he
received a phone call earlier in the week from your department and was asked to verify his user ID
and password. The user says he gave the caller his user ID and password. This user has fallen victim
to what specific type of attack?

A. Spear phishing

B. Vishing

C. Phishing

D. Replication

, Security+ 601 Quiz (McGraw-Hill Review Questions)

B. Vishing is a social engineering attack that uses voice communication technology to obtain the
information the attacker is seeking. Most often the attacker will call a victim and pretend to be
someone else in an attempt to extract information from the victim.



Coming into your office, you overhear a conversation between two security guards. One guard is
telling the other she caught several people digging through the trash behind the building early this
morning. The security guard says the people claimed to be looking for aluminum cans, but only had a
bag of papers—no cans. What type of attack has this security guard witnessed?

A. Spear phishing

B. Pharming

C. Dumpster diving

D. Rolling refuse

C. Dumpster diving is the process of going through a target's trash in the hopes of finding valuable
information such as user lists, directories, organization charts, network maps, passwords, and so on.



Which of the following are specifically used to spread influence, alter perceptions, and sway people
toward a position favored by those spreading it?

A. Identity fraud, invoice scams, credential harvesting

B. Hoaxes, eliciting information, urgency

C. Influence campaigns, social media, hybrid warfare

D. Authority, intimidation, consensus

C. Influence campaigns are used to alter perceptions and change people's minds on a topic. They are
even more powerful when used in conjunction with social media to spread influence through
influencer propagation. Nation-states often use hybrid warfare to sway people toward a position
favored by those spreading it.



Which of the following is a type of social engineering attack in which an attacker attempts to obtain
sensitive information from a user by masquerading as a trusted entity in an e-mail?

A. Phishing

B. Pharming

C. Spam

D. Vishing

, Security+ 601 Quiz (McGraw-Hill Review Questions)

A. This is the definition of a phishing attack, as introduced in chapter 1. The key elements of the
question are e-mail and the unsolicited nature of its sending (spam).



Which of the following is/are psychological tools used by social engineers to create false trust with a
target?

A. Impersonation

B. Urgency or scarcity

C. Authority

D. All of the above

D. Social engineers use a wide range of psychological tricks to fool users into trusting them, including
faking authority, impersonation, creating a sense of scarcity or urgency, and claiming familiarity.



Once an organization's security policies have been established, what is the single most effective
method of countering potential social engineering attacks?

A. An active security awareness program

B. A separate physical access control mechanism for each department in the organization

C. Frequent testing of both the organization's physical security procedures and employee telephone
practices

D. Implementing access control cards and the wearing of security identification badges

A. Because any employee may be the target of a social engineering attack, the best thing you can do
to protect your organization from these attacks is to implement an active security awareness
program to ensure that all employees are cognizant of the threat and what they can do to address it.



You notice a new custodian in the office, working much earlier than normal, emptying trash cans,
and moving slowly past people working. You ask him where the normal guy is, and in very broken
English he says, "Out sick," indicating a cough. What is happening?

A. Watering hole attack

B. Impersonation

C. Prepending

D. Identity fraud

Geschreven voor

Vak

Documentinformatie

Geüpload op
9 februari 2022
Aantal pagina's
110
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Smartexams Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
107
Lid sinds
5 jaar
Aantal volgers
103
Documenten
649
Laatst verkocht
1 maand geleden

3.9

18 beoordelingen

5
8
4
4
3
3
2
2
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen