<< Prev Question Next Question >>

Question 117/159

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company's building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted are a. Which type of attack did the consultant perform?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (159q)
Question 1: Which of the following functions evaluates patches used to c...
Question 2: What oversight should the information security team have in ...
Question 3: Your company has a "no right to privacy" notice on all logon...
Question 4: SCENARIO: A CISO has several two-factor authentication syste...
Question 5: Which of the following is the MOST important reason to measu...
Question 6: The ability to hold intruders accountable in a court of law ...
Question 7: Which of the following is of MOST importance when security l...
Question 8: Creating good security metrics is essential for a CISO. What...
Question 9: The process for management approval of the security certific...
Question 10: Providing oversight of a comprehensive information security ...
Question 11: Who is responsible for securing networks during a security i...
Question 12: Which of the following represents the HIGHEST negative impac...
Question 13: Scenario: A Chief Information Security Officer (CISO) recent...
Question 14: When deploying an Intrusion Prevention System (IPS), the BES...
Question 15: Which of the following is an accurate description of a balan...
Question 16: Which of the following activities is the MAIN purpose of the...
Question 17: What is the first thing that needs to be completed in order ...
Question 18: Which of the following is the MAIN reason to follow a formal...
Question 19: One of your executives needs to send an important and confid...
Question 20: You are the Chief Information Security Officer of a large, m...
Question 21: When choosing a risk mitigation method what is the MOST impo...
Question 22: A system was hardened at the Operating System level and plac...
Question 23: The organization does not have the time to remediate the vul...
Question 24: SCENARIO: A CISO has several two-factor authentication syste...
Question 25: What is one key difference between Capital expenditures and ...
Question 26: The security team has investigated the theft/loss of several...
Question 27: The CIO of an organization has decided to assign the respons...
Question 28: What should an organization do to ensure that they have a so...
Question 29: Scenario: Most industries require compliance with multiple g...
Question 30: File Integrity Monitoring (FIM) is considered a...
Question 31: Which of the following is a countermeasure to prevent unauth...
Question 32: The executive board has requested that the CISO of an organi...
Question 33: Scenario: Your organization employs single sign-on (user nam...
Question 34: The network administrator wants to strengthen physical secur...
Question 35: An organization's firewall technology needs replaced. A spec...
Question 36: Scenario: Your company has many encrypted telecommunications...
Question 37: Which of the following organizations is typically in charge ...
Question 38: An IT auditor has recently discovered that because of a shor...
Question 39: Knowing the potential financial loss an organization is will...
Question 40: An employee successfully avoids becoming a victim of a sophi...
Question 41: Creating a secondary authentication process for network acce...
Question 42: The BEST organization to provide a comprehensive, independen...
Question 43: The MOST common method to get an unbiased measurement of the...
Question 44: The process of creating a system which divides documents bas...
Question 45: Which of the following reports should you as an IT auditor u...
Question 46: Your incident handling manager detects a virus attack in the...
Question 47: The rate of change in technology increases the importance of...
Question 48: When gathering security requirements for an automated busine...
Question 49: Assigning the role and responsibility of Information Assuran...
Question 50: When dealing with risk, the information security practitione...
Question 51: Which of the following methods are used to define contractua...
Question 52: Scenario: Your program is developed around minimizing risk t...
Question 53: The Information Security Management program MUST protect:...
Question 54: Which of the following represents the BEST method for obtain...
Question 55: Which of the following would negatively impact a log analysi...
Question 56: The framework that helps to define a minimum standard of pro...
Question 57: Network Forensics is the prerequisite for any successful leg...
Question 58: Which of the following are the MOST important factors for pr...
Question 59: Human resource planning for security professionals in your o...
Question 60: The PRIMARY objective of security awareness is to:...
Question 61: Risk is defined as:
Question 62: Which of the following is the MOST effective way to measure ...
Question 63: Scenario: An organization has recently appointed a CISO. Thi...
Question 64: The newly appointed CISO of an organization is reviewing the...
Question 65: The executive board has requested that the CISO of an organi...
Question 66: Which of the following is true regarding expenditures?...
Question 67: A customer of a bank has placed a dispute on a payment for a...
Question 68: When should IT security project management be outsourced?...
Question 69: The purpose of NIST SP 800-53 as part of the NIST System Cer...
Question 70: An organization has implemented a change management process ...
Question 71: An anonymity network is a series of?...
Question 72: Dataflow diagrams are used by IT auditors to:...
Question 73: When briefing senior management on the creation of a governa...
Question 74: Which of the following functions MUST your Information Secur...
Question 75: Scenario: Your program is developed around minimizing risk t...
Question 76: In terms of supporting a forensic investigation, it is now i...
Question 77: What is the first thing that needs to be completed in order ...
Question 78: Which of the following are not stakeholders of IT security p...
Question 79: As a CISO you need to understand the steps that are used to ...
Question 80: When a critical vulnerability has been discovered on product...
Question 81: The effectiveness of social engineering penetration testing ...
Question 82: You are the Chief Information Security Officer of a large, m...
Question 83: The CIO of an organization has decided to assign the respons...
Question 84: The process for identifying, collecting, and producing digit...
Question 85: The exposure factor of a threat to your organization is defi...
Question 86: John is the project manager for a large project in his organ...
Question 87: The process of identifying and classifying assets is typical...
Question 88: SCENARIO: A Chief Information Security Officer (CISO) recent...
Question 89: What oversight should the information security team have in ...
Question 90: The BEST organization to provide a comprehensive, independen...
Question 91: The new CISO was informed of all the Information Security pr...
Question 92: The PRIMARY objective for information security program devel...
Question 93: A CISO implements smart cards for credential management, and...
Question 94: What does RACI stand for?
Question 95: Scenario: You are the CISO and have just completed your firs...
Question 96: A person in your security team calls you at night and inform...
Question 97: An audit was conducted and many critical applications were f...
Question 98: Which of the following is critical in creating a security pr...
Question 99: The PRIMARY objective for information security program devel...
Question 100: An international organization is planning a project to imple...
Question 101: Which of the following is the MOST important reason for perf...
Question 102: Which of the following best describes an access control proc...
Question 103: Which of the following tests is an IS auditor performing whe...
Question 104: A company wants to fill a Chief Information Security Officer...
Question 105: Payment Card Industry (PCI) compliance requirements are base...
Question 106: Smith, the project manager for a larger multi-location firm,...
Question 107: Which of the following terms is used to describe countermeas...
Question 108: A new CISO just started with a company and on the CISO's des...
Question 109: Scenario: An organization has recently appointed a CISO. Thi...
Question 110: SQL injection is a very popular and successful injection att...
Question 111: During the course of a risk analysis your IT auditor identif...
Question 112: What are the primary reasons for the development of a busine...
Question 113: You are having a penetration test done on your company netwo...
Question 114: Scenario: Your company has many encrypted telecommunications...
Question 115: A CISO implements smart cards for credential management, and...
Question 116: After a risk assessment is performed, a particular risk is c...
Question 117: A consultant is hired to do physical penetration testing at ...
Question 118: The ability to hold intruders accountable in a court of law ...
Question 119: Scenario: The new CISO was informed of all the Information S...
Question 120: Which of the following is the BEST indicator of a successful...
Question 121: When managing the security architecture for your company you...
Question 122: The new CISO was informed of all the Information Security pr...
Question 123: Which of the following will be MOST helpful for getting an I...
Question 124: When deploying an Intrusion Prevention System (IPS) the BEST...
Question 125: Who should be involved in the development of an internal cam...
Question 126: Scenario: Your corporate systems have been under constant pr...
Question 127: Physical security measures typically include which of the fo...
Question 128: When project costs continually increase throughout implement...
Question 129: SCENARIO: A CISO has several two-factor authentication syste...
Question 130: An organization is looking for a framework to measure the ef...
Question 131: A person in your security team calls you at night and inform...
Question 132: Your penetration testing team installs an in-line hardware k...
Question 133: The company decides to release the application without remed...
Question 134: Network Forensics is the prerequisite for any successful leg...
Question 135: What oversight should the information security team have in ...
Question 136: A global retail organization is looking to implement a consi...
Question 137: Scenario: An organization has recently appointed a CISO. Thi...
Question 138: Which of the following most commonly falls within the scope ...
Question 139: According to ISO 27001, of the steps for establishing an Inf...
Question 140: What is an approach to estimating the strengths and weakness...
Question 141: What is the term describing the act of inspecting all real-t...
Question 142: The PRIMARY objective for information security program devel...
Question 143: As the Chief Information Security Officer, you want to ensur...
Question 144: Which of the following can the company implement in order to...
Question 145: A security manager has created a risk program. Which of the ...
Question 146: Using the Transport Layer Security (TLS) protocol enables a ...
Question 147: You have purchased a new insurance policy as part of your ri...
Question 148: A CISO sees abnormally high volumes of exceptions to securit...
Question 149: Which type of physical security control scan a person's exte...
Question 150: Which of the following is a primary method of applying consi...
Question 151: SCENARIO: A Chief Information Security Officer (CISO) recent...
Question 152: Which of the following is the MOST important benefit of an e...
Question 153: Scenario: Your company has many encrypted telecommunications...
Question 154: From an information security perspective, information that n...
Question 155: When should IT security project management be outsourced?...
Question 156: Which of the following is considered the MOST effective tool...
Question 157: When deploying an Intrusion Prevention System (IPS) the BEST...
Question 158: Many times a CISO may have to speak to the Board of Director...
Question 159: What type of attack requires the least amount of technical e...