The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks
which led to a loss of sensitive data.
The security administrator advises the marketing department not to distribute the USB pens due to the following:
A company has purchased an application that integrates into their enterprise user directory for account authentication. Users are still prompted to type in their
usernames and passwords. Which of the following types of authentication is being utilized here?
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular
social media site together with the message: "Heading to our two weeks' vacation to Italy." Upon returning home, Joe discovers that the house was burglarized.
Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe's home address?
The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity.
Which of the following would be MOST effective for preventing this behavior?
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is
this describing?