Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
To prevent tailgating, mantraps are specifically designed
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Within physical security, lighting, locks, fences, and guards are all examples of __________ measures.
physical
Which social engineering attack was in the case: A man receives a text message on his phone purporting to be from Technical Services. The text advises of a security breach and provides a web link and phone number to follow up on. He turns over sensitive information when the man calls the number.
Smishing
Which of the following are true statements regarding the identification of phishing attempts if phishing e-mail attacks have caused severe harm to a company and the security office decides to provide training to all users in phishing prevention? (select all that apply.)
Ensure e-mail is from a trusted, legitimate e-mail address source.
Verify spelling and grammar is correct.
Verify all links before clicking them.
Employee background checks, device risk assessments, and key management and storage rules are all examples of __________ measures in physical security.
operational
To control or mitigate against static electricity in a computer room, which of the following is not a method used?
Positive pressure
Which attack has occurred in the situation: An attacker does a Whois search on a target company and finds the technical point of contact (POC) and site ownership e-mail addresses. He then composes an e-mail to the owner from the technical POI, instructing him to visit a link to view the site's online statistics. Instead, the link takes you to a bogus website where your credentials are taken.
Spear phishing
Bob decides to use social engineering during part of his pen test. He sends an unsolicited e-mail to several users on the network advising them of potential network problems and provides a phone number to call. Later that day, Bob performs a DoS on a network segment and then receives phone calls from users asking for assistance. Which social engineering practice is in play?
Reverse social engineering
To a target network or resource, which threat presents the highest risk?
A disgruntled employee
Phishing, pop-ups, and IRC channel use are all examples of which type of social engineering attack?
Computer based
Which of the following social engineering attacks is the best option if an attacker has physical access to a building and wants to attain access credentials to the network using nontechnical means?
Shoulder surfing
Which social engineering attack is in play in the situation that an attacker creates a fake ID badge and waits next to an entry door to a secured facility and an authorized user swipes a key card and opens the door, Jim follows the user inside?
Tailgating
Comments