On a train, an individual is watching a proprietary video on Peter’s laptop without his knowledge. Which of the following does this describe?
A. Tailgating
B. Shoulder surfing
C. Interference
D. Illegal downloading
CompTIA exam questions
On a train, an individual is watching a proprietary video on Peter’s laptop without his knowledge. Which of the following does this describe?
A. Tailgating
B. Shoulder surfing
C. Interference
D. Illegal downloading
Which of the following security threats are MOST often delivered via email? (Select TWO).
A. Rootkits
B. Phishing
C. Shoulder surfing
D. Social engineering
E. Spam
An employee receives a phone call inquiring about company information. This is an example of which of the following?
A. Phishing
B. Social engineering
C. Shoulder surfing
D. Rootkits
Turnstiles and other mantraps will prevent which of the following security threats?
A. Shoulder surfing
B. Tailgating
C. Rootkits
D. Viruses
Which of the following is a security threat that uses email to trick users?
A. Phishing
B. Virus
C. Spyware
D. Shoulder surfing
Jane, a user who works with many patients during the day, has a privacy screen attached to her monitor. Which of the following does this help prevent?
A. Rootkits
B. Phishing
C. Shoulder surfing
D. Trojans
E. Whaling
Privacy filters applied to users computer screens are used to combat which of the following security risks?
A. Rootkits
B. Spear phishing
C. Shoulder surfing
D. Social Engineering
Which of the following common security threats could be occurring when a user calls and requests his co-workers password?
A. Shoulder surfing
B. Spyware
C. Phishing
D. Social engineering
A pest exterminator tries to gain access to a companys computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
A. War driving
B. Social engineering
C. Shoulder surfing
D. Phishing
Peter, a user, should be aware of his surroundings when using a portable device to ensure that which of the following does not occur?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkits