Which of the following security threats requires the attacker to be physically located near the target machine?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkit
CompTIA exam questions
Which of the following security threats requires the attacker to be physically located near the target machine?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkit
A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
An administrator has advised against providing any information over the phone as a way to prevent against which of the following threats?
A. Session hijacking
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing
Which of the following security threats does NOT use software to extract sensitive information or credentials?
A. Grayware
B. Shoulder surfing
C. Malware
D. Man-in-the-Middle exploits
An unauthorized user observing system security procedures is known as:
A. A worm.
B. Shoulder surfing.
C. Phishing.
D. Spyware.
Physically observing a user input a code or password is known as:
A. Social engineering.
B. Shoulder surfing.
C. Tailgating.
D. Phishing.
An attack that creates a website that looks like another website, with the purpose of learning someones account information is called which of the following?
A. Virus
B. Shoulder surfing
C. Trojan
D. Phishing
An administrative assistant receives a phone call from the IT department asking for personal information to update their records. One of the questions asked is the password to the companys administrative portal. Which of the following is occurring?
A. Shoulder surfing
B. Configuration management
C. Helpdesk troubleshooting methodology
D. Social engineering
Which of the following security threats involve shoulder surfing and phone phishing?
A. Man-in-the-Middle
B. Social engineering
C. Trojan virus
D. Spyware
A prospective employee asks for wired Internet access while waiting for a job interview. Later, it is discovered that spyware was uploaded to the network from this particular location and the prospective employee cannot be contacted with the information provided. Which of the following security threats is this an example of?
A. Phishing
B. Shoulder surfing
C. Viruses
D. Social engineering