An attacker is scanning wireless networks and discovers that one of them is set up to support the two most recent protocols. What type of attack is the malicious actor most likely to launch to try to breach the security settings of the wireless device?
Lamarr receives a text message indicating the password to hi…
Lamarr receives a text message indicating the password to his bank account has been changed but needs verification to commit the change. It includes a number to call and a link, both of which will lead to fraud if Lamarr follows through with the instructions. This is an example of what type of attack?
Duante needs to research the behavior of attackers as well a…
Duante needs to research the behavior of attackers as well as how they coordinate their attacks. Where is Duante most likely to look for this type of information?
You are tasked with installing a system in a large warehouse…
You are tasked with installing a system in a large warehouse that is capable of detecting levels of daylight to dim interior lights to conserve energy. In addition, if an intruder enters the warehouse an alarm should be triggered. The system you install will most likely support what type of signal/radio wave?
A threat actor does research, including Google searches, and…
A threat actor does research, including Google searches, and discovers the cleaning establishment used by the company they want to target. The threat actor gets a job with the cleaning establishment for the sole purpose of obtaining any information that will help in their malicious efforts. What type of attack is the threat actor most likely to engage in?
Company A wants to be first to market with a product forecas…
Company A wants to be first to market with a product forecasted to be very profitable. A few bad actors in Company A launch an attack against Company B to steal intellectual property that will help them. What type of threat actor would do something like this?
A broker launches a variety of attacks to find a weakness th…
A broker launches a variety of attacks to find a weakness that will lead to financial gain. What activity is the broker most likely to engage in?
Evin thinks one of the computer systems where he works may h…
Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?
An attacker is the first malicious actor to discover a vulne…
An attacker is the first malicious actor to discover a vulnerability in a software application and exploits it for considerable financial gain. What could have been done to prevent this situation?
Which of the following best describes what Della could do to…
Which of the following best describes what Della could do to prevent unauthorized parties from viewing sensitive customer information at her retail store?