Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?
A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing
CompTIA exam questions
Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?
A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing
An attacker crafts a message that appears to be from a trusted source, but in reality it redirects the recipient to a malicious site where information is harvested. The message is narrowly tailored so it is effective on only a small number of victims. This describes which of the following?
A. Spear phishing
B. Phishing
C. Smurf attack
D. Vishing
Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO’s office with various connected cables from the office. Which of the following describes the type of attack that was occurring?
A. Spear phishing
B. Packet sniffing
C. Impersonation
D. MAC flooding
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?
A. Smurf attack
B. VLAN hopping
C. Bluesnarfing
D. Spear phishing
Privacy filters applied to users computer screens are used to combat which of the following security risks?
A. Rootkits
B. Spear phishing
C. Shoulder surfing
D. Social Engineering
A user, Jane, receives a call from Peter who states that he is brand new in the help desk. Peter states that he needs to update Janes email client to prevent corruption. At Peter’s request, Jane discloses her user name and password. She later discovers that Peter is not a member of the help desk. Which of the following has occurred?
A. Social engineering
B. Phishing
C. Spear phishing
D. Hijacking
When securing evidence of misconduct or illegal activity, which of the following describes the proper safeguarding of evidence?
A. CAPTCHA
B. Spear phishing
C. Chain of custody
D. Access control