chapter 3 cybersecurity
Security sequence
A person in a dark Gray hoodie has jumped the fence at your research center. A security guard has detained this person common denying him physical access. Which of the following areas of physical security is the security guard currently in?
Train the reception is to keep her iPad in a locked drawer
A receptionists is located next to the locked door and the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. What could you do to add and in dition a layer of security to this organization?
Social engineering
Any attack involving human interaction of some kind is referred to as
Moral obligation ignorance and threatening
Social engineers are master manipulators. Which of the following are tactics they might use
NIST
The US Department of Commerce has an agency with the goal of protecting organizational operations common assets, and individuals from threats such as malicious cyber attacks common natural disasters, structural failures, in human errors. Which of the following agencies with created for this purpose?
Shoulder Surfing
Brandon is helping Fred with his computer. He needs Fred enter his username and password into the system. Fred enters the user name and password while Brandon is watching him. Bringing explains to Fred that he is not a good idea to follow anyone to watch you type in user names or passwords. Which type of social and journey to attack is for or Fred referring to
Dome camera
Close circuit television can be used as both a preventive tool or as an investigative tool. Which came where as more a vandal resistant than other cameras?
elictitation
Compliments, misinformation and, finding nourrit's, and being a good listener our tactics of which social engineering techniques?
Employee and visitor safety
Implementing emergency lighting that runs on protected power and automatically switches on when the main power goes off is part of which physical control?
Preventing interruptions of computer services caused by problems such as
Important aspects of physical secured include which of the following?
Whaling
In attack that target senior executives and high profile victims is referred to as
DNS cache poisoning
Jason is at home, attempting to access the website for his music store. When he goes to the website, it has a simple form asking for name, email, and phone number. This is not the music store website. Jason is sure the website has been hacked. How did the attacker accomplish this hack?
Configure the screensaver to require a password
Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following is the best solutions for securing Jose workstation?
A hacker uses scripts written by much more talented individuals
Of the following best describes the script Kitty?
Man made threat
On her way to work, Angela accidentally left her backpack with a company laptop at the coffee shop. What type of threat has she caused the company course remark
Development phase
Ron a hacker wants to access to a prude stages law firm hes been watching for a while. June and administrative assistant at the law firm is having lunch at the food court around the corner from her office. Ron notices that June has a picture of her dog on her phone he casually walks by and starts a conversation about dogs which phase of the social engineering process is Ron in?
Pre texting
Using a fictional scenario to persuade someone to perform an action or give information they aren't authorized to share is called
Prevention, detection, and recovery
What are the 3 factors to keep in mind with physical security?
A thin, stiff piece of metal.
Which of the following best describes a lock shim?
Large flowerpots
Which of the following best describes a physical barrier used to deter an aggressive intruder?
An unintentional threat Actor ; the most common threat
Which of the following best describes and inside attacker?
Physical attack
Which type of attack involves changing the boot order on a PC said that the hacker can gain access to the computer by bypassing the install operating system?
Mantraps
While review and video files from your organization security cameras, you notice a suspicious person using piggy backing to gain access to your building. The individual in question did not have a security badge Which of the following would you most likely implement to keep this from happening in the future?
How to prevent piggy backing and tailgating
You are in the process of implementing policies and procedures that require employer identification. You observe employees holding a secure door for others to pass through. Which of the following training Sessions should you implement to help prevent this in the future?
spim
You are instant messaging a coworker and you get a malicious link. Which type with social engineering attack is this?
You should not provide any information and forward the call to the help desk
You get a call from one of your best customers. The customer has asking about your company's employees, teams, and managers. What should you do?
Shred the discs
You have a set of DVD-RW disks that were used to of our try follow from your last project breed you need to prevent the sensitive information on the disk from being compromise. Which of the following methods should you use to destroy the data?
Use incremental backups and store them in a locked fireproof safe
You have implemented a regular backup schedule frame window system common backing up data files every night and creating a system image backup once per week. Verse security reasons, your company has decided not to store a reducta n't copy of the backup media at an off site location. Which of the fine would be the best backup and storage option?