Security+ Chapter 10 Social Engineering and Other Foes

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the ff will NOT reduce EMI?

Humidity Control

Which fire extinguisher type is the best to be used on computer equipment in the case of a computer electrical fire?

Type C

You've been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain that the correct types are in the correct locations in the building. Which of the ff categories of the fire extinguisher is intended for use on electrical fires?

Type C (According to book. dry powder and C02)

What is the primary countermeasure to social engineering?

User Training

Which of the ff is the best example of perimeter security?

Video Camera. Not part of creating this, but assists to enhance physical security.

When you combine phishing with VOIP, what is it known as?

Vishing

Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?

Vishing

Which of the ff is the best description of shoulder surfing?

Watching someone enter important information.(phone password, IT password, ect)

Which of the ff is another name for social engineering?

Wetware

Computer room humidity should ideally be kept at approximately what level?

50%

Which technology uses a physical characteristic to establish security?

Biometrics

Proximity readers work with which of the ff? A. 15.75 Fob Card B. 14.32 Surveillance Card C. 13.56 MHZ Smart Card D. 125 kHz Proximity Card

C & D

In a hot and cold aisle system, what is the typical method of handling cold air?

Cold air is pumped in from below raised floor tiles.

Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry?

Deploy mantrap

If RF levels become too high, it can cause the receivers in wireless units to become deaf. What is this called?

Desensitizing

Which of the following statements about electrostatic discharge is not correct?

ESD is much more likely to occur when the relative humidity is above 50%

What is used to provide EMI and RFI shielding for an entire room of computer or electronic equipment (also used to prevent electronic eavesdropping).

Faraday Cage

Which of the ff is the best description of tailgating?

Following someone through a door they just unlocked

Due to the growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when its finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?

Gas Based

Which of the following is not a form of social engineering?

Impersonating a user by logging on with stolen credentials

You have decided that in order to get maximum life out of your networking gear that you want to deliver consistent and optimal power to your devices. Which device should you use to accomplish this goal?

Line conditioner

Which of the ff is an intermediate access control mechanism used in a high-security installation that requires visual identification, as well as authentication, to gain access?

Man Trap

The outermost edge of physical security is a barrier that is known as which of the following?

Perimeter

Which of the following attacks tricks victims into providing confidential information (such as identity information or login credentials) through emails or websites that impersonate an online entity that the victims trusts?

Phishing

What is the form of social engineering in which you simply ask someone for a piece of information that you want by making it look as if it is a legitimate request?

Phising

RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across which of the ff?

RFI is usually projected across a radio system. Some motors with defective brushes can generate RFI and interfere with devices.

Which of the following answer choices is the term for an area in a building where access is individually monitored and controlled?

Security Zone

You're the leader of the security committee. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the ff categories best describes motion detector mounted to the corner of a hallway?

Security Zone

The process of reducing or eliminating susceptibility to outside interference is called?

Sheilding

As part of your training program, you're trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced tech methods. Some attacks take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe this attack?

Social Engineering

Which kind of security attack is a result of the trusting nature of human beings?

Social Engineering

Which of the following is the least effective power loss protection for computer systems?

Surge Protector

You work for an electronics company that has just created a device that emits less RF than any competitors product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?

TEMPEST

Type K fire extinguishers are intended for us on choking oil fires. This type is a subset of which other type of fire extinguisher?

Type B


Conjuntos de estudio relacionados

1.2.3 Module 1, Quiz 1: Economics

View Set

MKT350 Chapter 1-Components of Strategic Marketing

View Set

Managing Workplace Diversity Final

View Set

Chapter 14 Understanding Individual

View Set

Session 2 - Chapter 3 Real Estate Financing Principles Quiz

View Set

Сучасні технології навчання дітей раннього віку іноземної мови

View Set

PSYCH 137J Self and Identity Midterm

View Set

Span 121-1 Cap 2 Vocab- University of the Future Section

View Set