Security+ Chapter 10 Social Engineering and Other Foes
Which of the ff will NOT reduce EMI?
Humidity Control
Which fire extinguisher type is the best to be used on computer equipment in the case of a computer electrical fire?
Type C
You've been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain that the correct types are in the correct locations in the building. Which of the ff categories of the fire extinguisher is intended for use on electrical fires?
Type C (According to book. dry powder and C02)
What is the primary countermeasure to social engineering?
User Training
Which of the ff is the best example of perimeter security?
Video Camera. Not part of creating this, but assists to enhance physical security.
When you combine phishing with VOIP, what is it known as?
Vishing
Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?
Vishing
Which of the ff is the best description of shoulder surfing?
Watching someone enter important information.(phone password, IT password, ect)
Which of the ff is another name for social engineering?
Wetware
Computer room humidity should ideally be kept at approximately what level?
50%
Which technology uses a physical characteristic to establish security?
Biometrics
Proximity readers work with which of the ff? A. 15.75 Fob Card B. 14.32 Surveillance Card C. 13.56 MHZ Smart Card D. 125 kHz Proximity Card
C & D
In a hot and cold aisle system, what is the typical method of handling cold air?
Cold air is pumped in from below raised floor tiles.
Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry?
Deploy mantrap
If RF levels become too high, it can cause the receivers in wireless units to become deaf. What is this called?
Desensitizing
Which of the following statements about electrostatic discharge is not correct?
ESD is much more likely to occur when the relative humidity is above 50%
What is used to provide EMI and RFI shielding for an entire room of computer or electronic equipment (also used to prevent electronic eavesdropping).
Faraday Cage
Which of the ff is the best description of tailgating?
Following someone through a door they just unlocked
Due to the growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when its finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?
Gas Based
Which of the following is not a form of social engineering?
Impersonating a user by logging on with stolen credentials
You have decided that in order to get maximum life out of your networking gear that you want to deliver consistent and optimal power to your devices. Which device should you use to accomplish this goal?
Line conditioner
Which of the ff is an intermediate access control mechanism used in a high-security installation that requires visual identification, as well as authentication, to gain access?
Man Trap
The outermost edge of physical security is a barrier that is known as which of the following?
Perimeter
Which of the following attacks tricks victims into providing confidential information (such as identity information or login credentials) through emails or websites that impersonate an online entity that the victims trusts?
Phishing
What is the form of social engineering in which you simply ask someone for a piece of information that you want by making it look as if it is a legitimate request?
Phising
RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across which of the ff?
RFI is usually projected across a radio system. Some motors with defective brushes can generate RFI and interfere with devices.
Which of the following answer choices is the term for an area in a building where access is individually monitored and controlled?
Security Zone
You're the leader of the security committee. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the ff categories best describes motion detector mounted to the corner of a hallway?
Security Zone
The process of reducing or eliminating susceptibility to outside interference is called?
Sheilding
As part of your training program, you're trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced tech methods. Some attacks take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe this attack?
Social Engineering
Which kind of security attack is a result of the trusting nature of human beings?
Social Engineering
Which of the following is the least effective power loss protection for computer systems?
Surge Protector
You work for an electronics company that has just created a device that emits less RF than any competitors product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?
TEMPEST
Type K fire extinguishers are intended for us on choking oil fires. This type is a subset of which other type of fire extinguisher?
Type B