image
  1.  You are testing physical security measures as part of a pen test team. Upon entering the lobby of the building, you see the entrance has a guard posted at the lone entrance. A door leads into a smaller room with a second door heading into the interior of the building. Which physical security measure is in place?
A.  Guard shack
B.  Turnstile
C.  Man shack
D.  Man trap
  2.  In your social engineering efforts, you call the company help desk and pose as a user who has forgotten a password. You ask the technician to help you reset your password, which they happily comply with. Which social engineering attack is in use here?
A.  Piggybacking
B.  Reverse social engineering
C.  Technical support
D.  Halo effect
  3.  Your client is considering a biometric system for access to a controlled location.
  Which of the following is a true statement regarding his decision?
A.  The lower the CER, the better the biometric system.
B.  The higher the CER, the better the biometric system.
C.  The higher the FRR, the better the biometric system.
D.  The higher the FAR, the better the biometric system.
  4.  A pen tester sends an unsolicited e-mail to several users on the target organization. The e-mail is well crafted and appears to be from the company’s help desk, advising users of potential network problems. The e-mail provides a contact number to call in the event they are adversely affected. The pen tester then performs a denial of service on several systems and receives phone calls from users asking for assistance. Which social engineering practice is in play here?
A.  Technical support
B.  Impersonation
C.  Phishing
D.  Reverse social engineering
  5.  A pen test member has gained access to a building and is observing activity as he wanders around. In one room of the building, he stands just outside a cubicle wall opening and watches the onscreen activity of a user. Which social engineering attack is in use here?
A.  Eavesdropping
B.  Tailgating
C.  Shoulder surfing
D.  Piggybacking
  6.  You are interviewing an incident response team member of an organization you’re working with. He relates an incident where a user received an e-mail that appeared to be from the U.S. Postal Service, notifying her of a package headed her way and providing a link for tracking the package. The link provided took the user to what appeared to be the USPS site, where she input her user information to learn about the latest shipment headed her way. Which attack did the user fall victim to?
A.  Phishing
B.  Internet level
C.  Reverse social engineering
D.  Impersonation
  7.  Which type of social engineering attacks use phishing, pop-ups, and IRC channels?
A.  Technical
B.  Computer based
C.  Human based
D.  Physical
  8.  An e-mail sent from an attacker to a known hacking group contains a reference stating, “Rebecca works for the finance department at _business-name_ and is the administrative assistant to the chief. She can be reached at _phone-number_.” What is most likely being communicated here?
A.  The name of an administrative assistant is being published to simplify later social engineering attacks.
B.  The administrative assistant for the chief of the finance department at this business is easily swayed by social engineering efforts.
C.  The finance department has a lax security policy in place.
D.  None of the above. There is not enough information to form a conclusion.
  9.  What are the three categories of measures taken to ensure physical security?
A.  Technical
B.  Computer based
C.  Physical
D.  Human based
E.  Operational
F.  Policy based
10.  After observing a target organization for several days, you discover that finance and HR records are bagged up and placed in an outside storage bin for later shredding/recycling. One day you simply walk to the bin and place one of the bags in your vehicle, with plans to rifle through it later. Which social engineering attack was used here?
A.  Offline
B.  Physical
C.  Piggybacking
D.  Dumpster diving
11.  An attacker waits outside the entry to a secured facility. After a few minutes an authorized user appears with an entry badge displayed. He swipes a key card and unlocks the door. The attacker, with no display badge, follows him inside. Which social engineering attack just occurred?
A.  Tailgating
B.  Piggybacking
C.  Identity theft
D.  Impersonation
12.  Which threat presents the highest risk to an organization’s resources?
A.  Government-sponsored hackers
B.  Social engineering
C.  Disgruntled employees
D.  Script kiddies
13.  Which of the following may be effective countermeasures against social engineering? (Choose all that apply.)
A.  Security policies
B.  Operational guidelines
C.  Appropriately configured IDS
D.  User education and training
E.  Strong firewall configuration
14.  Which of the following are indicators of a phishing e-mail? (Choose all that apply.)
A.  It does not reference you by name.
B.  It contains misspelled words or grammatical errors.
C.  It contains spoofed links.
D.  It comes from an unverified source.
15.  You are discussing physical security measures and are covering background checks on employees and policies regarding key management and storage. Which type of physical security measures are being discussed?
A.  Physical
B.  Technical
C.  Operational
D.  Practical
16.  Which of the following resources can assist in combating phishing in your organization? (Choose all that apply.)
A.  Phishkill
B.  Netcraft
C.  Phishtank
D.  IDA Pro
17.  In order, what are the three steps in a reverse social engineering attack?
A.  Technical support, marketing, sabotage
B.  Sabotage, marketing, technical support
C.  Marketing, technical support, sabotage
D.  Marketing, sabotage, technical support
18.  Which type of social engineering makes use of impersonation, dumpster diving, shoulder surfing, and tailgating?
A.  Physical
B.  Technical
C.  Human based
D.  Computer based
19.  What is considered the best defense against social engineering?
A.  User education and training
B.  Strong security policy and procedure
C.  Clear operational guidelines
D.  Proper classification of information and individuals’ access to that information
20.  Which anti-phishing method makes use of a secret message or image referenced on the communication?
A.  Steganography
B.  Sign-in seal
C.  PKI
D.  Captcha
21.  Which of the following should be in place to assist as a social engineering countermeasure? (Choose all that apply.)
A.  Classification of information
B.  Strong security policy
C.  User education
D.  Strong change management process
22.  Joe uses a user ID and password to log into the system every day. Jill uses a PIV card and a pin number. Which of the following statements is true?
A.  Joe and Jill are using single-factor authentication.
B.  Joe and Jill are using two-factor authentication.
C.  Joe is using two-factor authentication.
D.  Jill is using two-factor authentication.
23.  A system owner has implemented a retinal scanner at the entryway to the data floor. Which type of physical security measure is this?
A.  Technical
B.  Single factor
C.  Computer based
D.  Operational
24.  Physical security also includes the maintenance of the environment and equipment for your data floor. Which of the following are true statements regarding this equipment? (Choose all that apply.)
A.  The higher the MTBF, the better.
B.  The lower the MTBF, the better.
C.  The higher the MTTR, the better.
D.  The lower the MTTR, the better.
25.  Which fire extinguisher type is the best choice for an electrical system fire?
A.  An extinguisher marked “A”
B.  An extinguisher marked “B”
C.  An extinguisher marked “C”
D.  An extinguisher marked “D”
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset