<< Prev Question Next Question >>

Question 97/115

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company's building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (115q)
Question 1: A method to transfer risk is to:...
Question 2: The exposure factor of a threat to your organization is defi...
Question 3: The process of identifying and classifying assets is typical...
Question 4: Which of the following reports should you as an IT auditor u...
Question 5: Which of the following are the triple constraints of project...
Question 6: Which of the following international standards can be BEST u...
Question 7: Who is responsible for securing networks during a security i...
Question 8: Which of the following defines the boundaries and scope of a...
Question 9: SCENARIO: A Chief Information Security Officer (CISO) recent...
Question 10: Which of the following terms is used to describe countermeas...
Question 11: At which point should the identity access management team be...
Question 12: Which of the following is an accurate statement regarding ca...
Question 13: What type of attack requires the least amount of technical e...
Question 14: A Security Operations Centre (SOC) manager is informed that ...
Question 15: An organization is looking for a framework to measure the ef...
Question 16: Acme Inc. has engaged a third party vendor to provide 99.999...
Question 17: When a critical vulnerability has been discovered on product...
Question 18: A CISO decides to analyze the IT infrastructure to ensure se...
Question 19: What is meant by password aging?...
Question 20: An organization's Information Security Policy is of MOST imp...
Question 21: An organization has implemented a change management process ...
Question 22: Risk appetite directly affects what part of a vulnerability ...
Question 23: What should an organization do to ensure that they have a so...
Question 24: A CISO has recently joined an organization with a poorly imp...
Question 25: A new CISO just started with a company and on the CISO's des...
Question 26: Risk is defined as:
Question 27: Which of the following can the company implement in order to...
Question 28: You are just hired as the new CISO and are being briefed on ...
Question 29: SCENARIO: A CISO has several two-factor authentication syste...
Question 30: You are the Chief Information Security Officer of a large, m...
Question 31: As the Chief Information Security Officer, you are performin...
Question 32: A CISO decides to analyze the IT infrastructure to ensure se...
Question 33: In terms of supporting a forensic investigation, it is now i...
Question 34: What is the definition of Risk in Information Security?...
Question 35: The PRIMARY objective for information security program devel...
Question 36: In order for a CISO to have true situational awareness there...
Question 37: From an information security perspective, information that n...
Question 38: A newly-hired CISO needs to understand the organization's fi...
Question 39: Which of the following functions evaluates risk present in I...
Question 40: An organization has a stated requirement to block certain tr...
Question 41: A newly appointed security officer finds data leakage softwa...
Question 42: The implementation of anti-malware and anti-phishing control...
Question 43: The ability to demand the implementation and management of s...
Question 44: A company wants to fill a Chief Information Security Officer...
Question 45: Providing oversight of a comprehensive information security ...
Question 46: Which of the following illustrates an operational control pr...
Question 47: Which represents PROPER separation of duties in the corporat...
Question 48: An information security department is required to remediate ...
Question 49: Quantitative Risk Assessments have the following advantages ...
Question 50: Which type of physical security control scan a person's exte...
Question 51: Which of the following is considered the MOST effective tool...
Question 52: Which of the following most commonly falls within the scope ...
Question 53: Which of the following represents the HIGHEST negative impac...
Question 54: A department within your company has proposed a third party ...
Question 55: A key cybersecurity feature of a Personal Identification Ver...
Question 56: As the new CISO at the company you are reviewing the audit r...
Question 57: Which of the following BEST describes an international stand...
Question 58: During the 3rd quarter of a budget cycle, the CISO noticed s...
Question 59: Which of the following has the GREATEST impact on the implem...
Question 60: The establishment of a formal risk management framework and ...
Question 61: Credit card information, medical data, and government record...
Question 62: Many times a CISO may have to speak to the Board of Director...
Question 63: What is the BEST way to achieve on-going compliance monitori...
Question 64: When should IT security project management be outsourced?...
Question 65: Step-by-step procedures to regain normalcy in the event of a...
Question 66: When entering into a third party vendor agreement for securi...
Question 67: What is one key difference between Capital expenditures and ...
Question 68: Which of the following is a symmetric encryption algorithm?...
Question 69: Which of the following would negatively impact a log analysi...
Question 70: What is the first thing that needs to be completed in order ...
Question 71: The total cost of security controls should:...
Question 72: What two methods are used to assess risk impact?...
Question 73: How often should an environment be monitored for cyber threa...
Question 74: Which of the following is used to establish and maintain a f...
Question 75: The Annualized Loss Expectancy (Before) minus Annualized Los...
Question 76: SCENARIO: A CISO has several two-factor authentication syste...
Question 77: Dataflow diagrams are used by IT auditors to:...
Question 78: Which of the following strategies provides the BEST response...
Question 79: Which technology can provide a computing environment without...
Question 80: When a CISO considers delaying or not remediating system vul...
Question 81: Information Security is often considered an excessive, after...
Question 82: The security team has investigated the theft/loss of several...
Question 83: Scenario: Your company has many encrypted telecommunications...
Question 84: Which of the following is the MOST effective method for disc...
Question 85: When you develop your audit remediation plan what is the MOS...
Question 86: Human resource planning for security professionals in your o...
Question 87: A Chief Information Security Officer received a list of high...
Question 88: Which of the following will be MOST helpful for getting an I...
Question 89: Scenario: You are the CISO and are required to brief the C-l...
Question 90: You work as a project manager for TYU project. You are plann...
Question 91: Your incident response plan should include which of the foll...
Question 92: Which of the following best describes an access control proc...
Question 93: Which of the following activities must be completed BEFORE y...
Question 94: A security manager has created a risk program. Which of the ...
Question 95: If the result of an NPV is positive, then the project should...
Question 96: Which of the following is a common technology for visual mon...
Question 97: A consultant is hired to do physical penetration testing at ...
Question 98: The general ledger setup function in an enterprise resource ...
Question 99: The single most important consideration to make when develop...
Question 100: The process for identifying, collecting, and producing digit...
Question 101: Which of the following is considered a project versus a mana...
Question 102: Scenario: As you begin to develop the program for your organ...
Question 103: A security officer wants to implement a vulnerability scanni...
Question 104: Scenario: You are the CISO and are required to brief the C-l...
Question 105: Scenario: An organization has made a decision to address Inf...
Question 106: What oversight should the information security team have in ...
Question 107: A business unit within your organization intends to deploy a...
Question 108: A severe security threat has been detected on your corporate...
Question 109: The effectiveness of social engineering penetration testing ...
Question 110: With respect to the audit management process, management res...
Question 111: Which of the following represents the BEST method for obtain...
Question 112: After a risk assessment is performed, a particular risk is c...
Question 113: Which type of scan is used on the eye to measure the layer o...
Question 114: What is the MAIN reason for conflicts between Information Te...
Question 115: Scenario: You are the CISO and have just completed your firs...