CompTIA Security+ 2.2 Threats, Attacks and Vulnerabilities – Common Threat Vectors

Posted by:

|

On:

|

Common Threat Vectors

1 / 25

Which of the following best describes shoulder surfing?

2 / 25

Which of the following is a common indicator of a business email compromise (BEC) attack?

3 / 25

Which of the following is a common technique used in social engineering attacks to exploit human psychology?

4 / 25

Which of the following best describes invoice scams?

5 / 25

Which of the following best describes smishing?

6 / 25

Which of the following is an example of a credential harvesting attack?

7 / 25

Which of the following is a common defense against tailgating?

8 / 25

Which of the following best describes the concept of social engineering?

9 / 25

Which of the following best describes spear phishing?

10 / 25

Which of the following best describes the principle of social proof in social engineering?

11 / 25

What type of phishing attack specifically targets high-level executives or other high-value individuals within an organization?

12 / 25

What type of social engineering attack involves creating a false scenario to obtain information or access?

13 / 25

Which of the following best describes typosquatting?

14 / 25

Which of the following is a common indicator of a phishing email?

15 / 25

What type of social engineering attack involves leaving infected USB drives in public places?

16 / 25

Which of the following best describes the principle of scarcity in social engineering?

17 / 25

Which of the following is a common characteristic of spear phishing attacks?

18 / 25

Which of the following best describes dumpster diving in the context of social engineering?

19 / 25

Which of the following best describes pharming?

20 / 25

Which of the following best describes vishing?

21 / 25

Which of the following is an example of a physical social engineering attack?

22 / 25

Which of the following is a common goal of social engineering attacks?

23 / 25

Which of the following is a common technique used in watering hole attacks?

24 / 25

Which of the following is an effective countermeasure against phishing attacks?

25 / 25

Which of the following is a key characteristic of business email compromise (BEC) attacks?

Your score is

Exit