CompTIA A+ Core 2 Question F-12

An administrative assistant receives a phone call from the IT department asking for personal information to update their records. One of the questions asked is the password to the companys administrative portal. Which of the following is occurring?

A. Shoulder surfing
B. Configuration management
C. Helpdesk troubleshooting methodology
D. Social engineering

Correct Answer: D

CompTIA A+ Core 2 Question D-75

A user, Jane, receives a call from Peter who states that he is brand new in the help desk. Peter states that he needs to update Janes email client to prevent corruption. At Peter’s request, Jane discloses her user name and password. She later discovers that Peter is not a member of the help desk. Which of the following has occurred?

A. Social engineering
B. Phishing
C. Spear phishing
D. Hijacking

CompTIA A+ Core 2 Question D-9

A prospective employee asks for wired Internet access while waiting for a job interview. Later, it is discovered that spyware was uploaded to the network from this particular location and the prospective employee cannot be contacted with the information provided. Which of the following security threats is this an example of?

A. Phishing
B. Shoulder surfing
C. Viruses
D. Social engineering

Correct Answer: D

CompTIA A+ Core 2 Question B-99

A company’s security guard found Jane, an unauthorized person, searching through the recycling dumpster behind the building. When Jane was questioned she responded with, “I work for the company and have lost a report”. Which of the following is occurring?

A. Social engineering
B. Malware
C. Phishing
D. Shoulder surfing

Correct Answer: A

CompTIA A+ Core 2 Question B-27

Peter, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Peter is the victim of which of the following?

A. Trojan horse
B. Spyware
C. Social engineering
D. Worms

Correct Answer: A

CompTIA A+ Core 2 Question A-34

Jane, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?

A. Social engineering
B. Spoofing
C. Zero-day
D. Man-in-the-middle

Correct Answer: A

CompTIA A+ Core 2 Question A-29

Jane, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?

A. Shoulder surfing
B. Man-in-the-middle
C. Social engineering
D. Ransomware

Correct Answer: C