1.
Which of the following attacks could be the most common and most successful when network security is properly implemented and configured?
2.
You are working as a technician at Certkiller .com. You boss has heard about an attack that plays on human behavior and how people interact. What is he referring to?
3.
You are working as a technician at Certkiller .com. You receive a call from a suspicious user that has received an email stating that the company's network administrators are attempting to validate the complexity of login passwords by requesting that users provide the password in a reply email. Which of following actions should recommend the user to take?
4.
You work as a technician at Certkiller .com. You receive a telephone call from a user stating that he has forgotten the password and is unable to access company email. What should you answer the calling person?
5.
Which of the following statements is TRUE regarding the attack which makes data appear to come from somewhere other than the originating point?
6.
You work as a network technician at Certkiller .com. The Certkiller .com trainee has asked you which preventative maintenance should be performed on a computer with access to the Internet. What would your reply be?
7.
You work as a network technician at Certkiller .com. A Certkiller .com user has asked you what the type of attack is known of which plays on human behavior and how people interact. What would your reply be?
8.
A Certkiller .com technician notices that there is a water leak in the ceiling of the server room. Which of the following is the BEST action the technician can take?
9.
You are working as a network technician at Certkiller .com. As you enter a server room you observe water dripping from the ceiling. Which of the following should you do?
10.
The FIRST thing a Certkiller .com technician should do when making an on-site call is to ______.