While performing a routing site audit of your wireless network, you discover an unauthorized Access Point placed on your network under the desk of Accounting department security. When questioned, she denies any knowledge of it, but informs
A.
SYN Flood.
B.
Distributed Denial of Service.
C.
Man in the Middle attack.
D.
TCP Flood.
E.
IP Spoofing.
F.
Social Engineering
G.
Replay attack
H.
Phone tag
I.
Halloween attack
Explanation:
Social engineering is a process where an attacker attempts to acquire information about your network and system by talking to people in the organization. A social engineering attack may occur over the phone, be e-mail, or by a visit.
Reference: Security + (SYBEX) page 87
Incomplete Question. I don’t see any way that this answer would apply to this question – as the social engineering attack doesn’t normally use physical equipment to access the network but instead uses deception to gain access by gaining confidential access information.