Privacy filters applied to users computer screens are used to combat which of the following security risks?
A. Rootkits
B. Spear phishing
C. Shoulder surfing
D. Social Engineering
CompTIA exam questions
Privacy filters applied to users computer screens are used to combat which of the following security risks?
A. Rootkits
B. Spear phishing
C. Shoulder surfing
D. Social Engineering
Which of the following common security threats could be occurring when a user calls and requests his co-workers password?
A. Shoulder surfing
B. Spyware
C. Phishing
D. Social engineering
A pest exterminator tries to gain access to a companys computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
A. War driving
B. Social engineering
C. Shoulder surfing
D. Phishing
Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?
A. Grayware installation
B. Worm transmission
C. Human interaction
D. Malware installation
Peter, a user, should be aware of his surroundings when using a portable device to ensure that which of the following does not occur?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkits
Which of the following security threats requires the attacker to be physically located near the target machine?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkit
A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
An administrator has advised against providing any information over the phone as a way to prevent against which of the following threats?
A. Session hijacking
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing
Which of the following would be the BEST way to combat social engineering?
A. User education
B. Deny social networks through the firewall
C. Badges
D. Strong password usage
Physically observing a user input a code or password is known as:
A. Social engineering.
B. Shoulder surfing.
C. Tailgating.
D. Phishing.