CompTIA A+ Core 2 Objective 2.4 – Security – Social Engineering

Posted by:

|

On:

|

,

Social Engineering

1 / 8

An IT support specialist receives a call from an individual claiming to be from a well-known software vendor. The caller requests remote access to the company’s network to perform a critical update. Which of the following actions should the IT support specialist take to verify the caller’s authenticity?

2 / 8

During a routine audit, an IT administrator notices several unauthorized access attempts to secure company servers. The logs reveal these attempts were made using credentials of employees during times they were not at work. Further investigation shows these employees had recently received support calls from someone claiming to be from the IT department, asking for their credentials to solve a non-existent issue. Which of the following social engineering techniques was used in this scenario?

3 / 8

A company has implemented several cybersecurity measures to protect its digital assets. However, they recently learned that sensitive information was still being leaked. Upon investigation, it was discovered that the leak was due to discarded documents in the company’s external trash bins. Which of the following actions should the company take to prevent this type of data breach in the future?

4 / 8

An employee frequently works in crowded public spaces using sensitive company information. Which of the following practices would most effectively reduce the risk of shoulder surfing?

5 / 8

An employee in a large corporation receives an email from what appears to be the company’s IT department. The email states that the company is updating its security software and requires all employees to log in through a provided link to verify their accounts. What should the employee do first before proceeding with any action requested in the email?

6 / 8

A small healthcare clinic has become aware of the risk of sensitive patient information being compromised through dumpster diving. Which of the following measures should the clinic implement to best protect against this type of data breach?

7 / 8

A company’s employees frequently work from public cafés. The IT department wants to implement a policy to protect against evil twin attacks when employees connect to Wi-Fi networks. Which of the following policies would best achieve this?

8 / 8

An IT security officer is reviewing the company’s physical security measures to prevent unauthorized access to secure areas. Which of the following would be the most effective measure to mitigate the risk of tailgating?

Your score is

Exit