SY0-601 Midterm 1 EXAM WITH |\ |\ |\ |\ |\
ANSWERS
A social engineering technique whereby attackers under
|\ |\ |\ |\ |\ |\ |\
disguise of a legitimate request attempt to gain access to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
confidential information is commonly referred to as:
|\ |\ |\ |\ |\ |\
Phishing
Privilege escalation |\
Backdoor access |\
Shoulder surfing - CORRECT ANSWERS ✔✔Phishing
|\ |\ |\ |\ |\
Which of the following answers refer to smishing? (Select
|\ |\ |\ |\ |\ |\ |\ |\ |\
2 answers)
|\
Social engineering technique
|\ |\
E-mail communication
|\
Spam over Internet Telephony (SPIT)
|\ |\ |\ |\
Text messaging
|\
Spam over Internet Messaging (SPIM) - CORRECT
|\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Social engineering technique |\ |\ |\
Text messaging
|\
,The practice of using a telephone system to manipulate
|\ |\ |\ |\ |\ |\ |\ |\ |\
user into disclosing confidential information is known as:
|\ |\ |\ |\ |\ |\ |\
Whaling
Spear phishing |\
Vishing |\
Pharming - CORRECT ANSWERS ✔✔Vishing |\ |\ |\ |\
Which of the following terms is commonly used to
|\ |\ |\ |\ |\ |\ |\ |\ |\
describe an unsolicited advertising message?
|\ |\ |\ |\
Spyware
Adware
Malware
Spam - CORRECT ANSWERS ✔✔Spam
|\ |\ |\ |\
What type of spam relies on text-based communication?
|\ |\ |\ |\ |\ |\ |\
Vishing
SPIM |\
Bluesnarfing
SPIT - CORRECT ANSWERS ✔✔SPIM
|\ |\ |\ |\
,Phishing scams targeting a specific group of people are
|\ |\ |\ |\ |\ |\ |\ |\ |\
referred to as: |\ |\
Vishing
Spear phishing |\
Spoofing
Whaling - CORRECT ANSWERS ✔✔Spear phishing |\ |\ |\ |\ |\
In computer security, the term "Dumpster diving" is used
|\ |\ |\ |\ |\ |\ |\ |\ |\
to describe a practice of sifting through trash for
|\ |\ |\ |\ |\ |\ |\ |\ |\
discarded documents containing sensitive data. Found |\ |\ |\ |\ |\ |\
documents containing names and surnames of the |\ |\ |\ |\ |\ |\ |\
employees along with the information about positions |\ |\ |\ |\ |\ |\ |\
held in the company and other data can be used to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
facilitate social engineering attacks. Having the |\ |\ |\ |\ |\ |\
documents shredded or incinerated before disposal |\ |\ |\ |\ |\ |\
makes dumpster diving less effective and mitigates the
|\ |\ |\ |\ |\ |\ |\ |\
risk of social engineering attacks.
|\ |\ |\ |\
True
False - CORRECT ANSWERS ✔✔True|\ |\ |\ |\
A situation in which an unauthorized person can view
|\ |\ |\ |\ |\ |\ |\ |\ |\
another user's display or keyboard to learn their password
|\ |\ |\ |\ |\ |\ |\ |\
or other confidential information is referred to as:
|\ |\ |\ |\ |\ |\ |\ |\
, Spear phishing
|\
Tailgating
Shoulder surfing |\ |\
Spoofing - CORRECT ANSWERS ✔✔Shoulder surfing
|\ |\ |\ |\ |\
Which of the following answers refer to the characteristic
|\ |\ |\ |\ |\ |\ |\ |\ |\
features of pharming? (Select 3 answers)
|\ |\ |\ |\ |\
Domain hijacking |\
Traffic redirection
|\ |\
Fraudulent website |\
Password attack |\
Credential harvesting - CORRECT ANSWERS ✔✔Traffic
|\ |\ |\ |\ |\ |\
redirection |\
Fraudulent website |\
Credential harvesting |\
What is tailgating?
|\ |\
Acquiring unauthorized access to confidential data
|\ |\ |\ |\ |\
Looking over someone's shoulder to get information
|\ |\ |\ |\ |\ |\
Gaining unauthorized access to restricted areas by
|\ |\ |\ |\ |\ |\ |\
following another person |\ |\ |\