1300
/ /
FINAL EXAM QUESTIONS WITH CORRECT ANSWERS
/ // // // // //
1. /
/You /
/receive //a //call //from //someone //pretending //to //be //a //government //agent. //They //claim //there //is
an /
/issue /
/with //your //taxes //and //you //need //to //provide //certain //information //to //clear //up //the //problem.
However, /
/the //caller's //true //goal //is //to //obtain //private //information. //Which //of //the //following //best
describes //this //behavior?
// a. //Vishing
// b. //Smishing
// c. //Vectoring
// d. //Pretexting //- //CORRECT //ANSWERS(S)✔✔d. //Pretexting
3. /
/An //individual //who //was //recently //fired //goes //to //their //former //place //of //employment //on //a
weekend. /
/Since //they //are //unable //to //enter, //security //goes //to //the //front //door //to //inquire. //The //fired
employee /
/says //they //forgot //their //access //card //and //just //needs //to //pick //up //their //tablet //in //their
office. //What //attack //surface //is //the //former //employee //trying //to //exploit?
// a. //Human //vector
// b. //Mobile //device
,// c. //Hardware
// d. //Specialized //vector //- //CORRECT //ANSWERS(S)✔✔a. //Human //vector
15. /
/Lamarr //receives //a //text //message //indicating //the //password //to //his //bank //account //has //been
changed /
/but //needs //verification //to //commit //the //change. //It //includes //a //number //to //call //and //a //link,
both /
/of //which //will //lead //to //fraud //if //Lamarr //follows //through //with //the //instructions. //This //is //an
example //of //what //type //of //attack?
// a. //Vishing
// b. //Smishing
// c. //Urgency //attack
d. //Account //compromise //attack //- //CORRECT //ANSWERS(S)✔✔b. //Smishing
17. /
/Which /
/of //the //following //best //describes //what //could //be //considered //a //security //buffer? //Select
two.
// a. //Lobby //of //a //bank
// b. //Ticket //booth //at //a //cinema
// c. //Reception //area //of //a //company
/
/d. /
/Waiting /
/room /
/at //a //doctor's //office //- //CORRECT //ANSWERS(S)✔✔c. //Reception //area //of //a //company
// d. //Waiting //room //at //a //doctor's //office
, 20. //
A/
/company /
/uses //a //fence //to //deter //physical //access. //An //audit //report //concluded //that //since //the
fence /
/can //be //easily //scaled, //additional //measures //should //be //implemented. //What //additional
fencing-deterrent //measure //could //the //company //implement //to //gain //an //added //layer //of
protection? //Select //three.
// a. //Anticlimb //collar
// b. //Roller //barrier
// c. //Rotating //spikes
// d. //Chain-link //fence
// e. //Barricades //in //front //of //the //fence //- //CORRECT //ANSWERS(S)✔✔a. //Anticlimb //collar
// b. //Roller //barrier
// c. //Rotating //spikes
1. /
/Alpha /
/and /
/Beta /
/are /
/having //
a //conversation //in //English. //Gamma, //who //is //a //gifted //conversationalist //and //tends //to
monopolize /
/conversations, /
/approaches //Alpha //and //Beta. //As //soon //as //Alpha //and //Beta //see //Gamma, //they //start
speaking /
/in //Spanish, //but //Gamma //does //not //understand. //What //did //Alpha //and //Beta //just //do?
// a. //They //employed //a //form //of //tokenization.
// b. //They //employed //a //form //of //encryption.