click below
click below
Normal Size Small Size show me how
Security+ Practice
| Question | Answer |
|---|---|
| A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as: | |
| Smishing can occur with: | Texting and IM |
| The practice of using a telephone system to manipulate user into disclosing confidential information is known as: | Vishing |
| What is the name of an unsolicited advertising message? | Spam |
| What type of spam relies on text-based communication? | |
| Phishing scams targeting a specific group of people are referred to as: | Spear Phishing |
| "Dumpster diving" is a computer security practice where discarded documents containing sensitive data are sifted through trash, potentially facilitating social engineering attacks. Shredding or incineration before disposal reduces this risk. | True |
| A situation in which an unauthorized person can view another user's display or keyboard to learn their password or other confidential information is referred to as: | Shoulder Surfing |
| What are the three characteristics of pharming? | Traffic Redirection, Fraudulent Website, and Credential Harvesting |
| What is tailgating? | Gaining unauthorized access to restricted areas by following another person. |
| In social engineering, the term "Elicitation" describes the use of casual conversation to extract non-public information from people without giving them the feeling they are being interrogated. | True |
| What is bracketing? | |
| What is Confidential Bait? |