Threats and Vulnerabilities
SKILLSET
No description available
Related Questions
- Which of these attacks focuses on testing the 'human' element of security?
- It is important to not only test your company's network and external facing applications, but to also test the knowledge and awareness of employees through this type of testing using illegitimate source email addresses?
- Looking over someone's shoulder in order to gather the username, password or other secret information is a technique called _______?
- An attacker is waiting outside an entry point where biometric authorization is required. When an authorized person or employee comes and opens the door, the attacker rushes in pretending his hands are full of heavy items. The attacker requests this authorized person to please hold open the door, who obliges allowing the attacker to enter. What type of attack has just taken place?
- Although not a glamorous activity, __________ is a social engineering tool/activity that may lead to the exposure of sensitive company data that has not been properly disposed of.
- What is NOT a social engineering attack?
- This methodology employs a number of techniques to determine the level of ‘security awareness’ that exists within the organization.
- You overhear a receptionist discussing the mass of shipment orders she has to process every week. Later you craft a PDF disguised to appear as a shipment manifest which has a malicious link in it. When the receptionist opens the email he clicks on the link and is infected with malware. What type of attack took place?
- When using non-technical assessment methods to assess the security of an organization, which of the following techniques would be best for determining end-user security training requirements?
- Any act that influences a person to take an action that may or may not be in their best interest, is known as social engineering?