Threats and Vulnerabilities
No description available
- A man is attempting to gain access into Medical Inc. to steal sensitive information. He calls the HR department and says he is from IT. He tells the HR representative that they have a virus and their computer is infecting the network. He adds that if he does not get access to their computer they could be fired for security noncompliance. Which social engineering principle is being used?
- What term applies when an attacker uses a person’s personal details to increase their credibility?
- Any act that influences a person to take an action that may or may not be in their best interest, is known as social engineering?
- What is the main reason the use of stored biometrics are vulnerable to attacks?
- Which of the following are examples of implementing physical security? (Select all that apply.)
- Today's network defenses have become more robust. Which attack methodology can be used to supersede these kind of barriers?
- What is NOT a social engineering attack?
- If a hacker follows an employee through a secure door, without actually having his/her own access credentials, then this activity would be called:
- Someone from the IT department found a USB drive on the bathroom floor and it was labeled "layoffs." Should this be considered a social engineering tactic?
- Social Engineering can be used when planning to hack a wireless network