You receive a call from someone pretending to be a governmen…
You receive a call from someone pretending to be a government agent. They claim there is an issue with your taxes and you need to provide certain information to clear up the problem. However, the caller’s true goal is to obtain private information. Which of the following best describes this behavior?
Read DetailsAlpha and Beta are having a conversation in English. Gamma,…
Alpha and Beta are having a conversation in English. Gamma, who is a gifted conversationalist and tends to monopolize conversations, approaches Alpha and Beta. As soon as Alpha and Beta see Gamma, they start speaking in Spanish, but Gamma does not understand. What did Alpha and Beta just do?
Read DetailsLamarr receives a text message indicating the password to hi…
Lamarr receives a text message indicating the password to his bank account has been changed but needs verification to commit the change. It includes a number to call and a link, both of which will lead to fraud if Lamarr follows through with the instructions. This is an example of what type of attack?
Read DetailsEvin thinks one of the computer systems where he works may h…
Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?
Read DetailsKarlo installs an alarm system that is capable of emitting a…
Karlo installs an alarm system that is capable of emitting and detecting a signal in the light spectrum. The capability serves the purpose of detecting motion and how close an object is in a limited space. Which of the following best describes the type of signal the emitter can transmit?
Read DetailsAn individual who was recently fired goes to their former pl…
An individual who was recently fired goes to their former place of employment on a weekend. Since they are unable to enter, security goes to the front door to inquire. The fired employee says they forgot their access card and just needs to pick up their tablet in their office. What attack surface is the former employee trying to exploit?
Read Details