When questioned, she denies any knowledge of it, but informs

While performing a routing site audit of your wireless network, you discover an unauthorized Access Point placed on your network under the desk of Accounting department security. When questioned, she denies any knowledge of it, but informs

While performing a routing site audit of your wireless network, you discover an unauthorized Access Point placed on your network under the desk of Accounting department security. When questioned, she denies any knowledge of it, but informs

A.
SYN Flood.

B.
Distributed Denial of Service.

C.
Man in the Middle attack.

D.
TCP Flood.

E.
IP Spoofing.

F.
Social Engineering

G.
Replay attack

H.
Phone tag

I.
Halloween attack

Explanation:
Social engineering is a process where an attacker attempts to acquire information about your network and system by talking to people in the organization. A social engineering attack may occur over the phone, be e-mail, or by a visit.
Reference: Security + (SYBEX) page 87



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ric

Ric

Incomplete Question. I don’t see any way that this answer would apply to this question – as the social engineering attack doesn’t normally use physical equipment to access the network but instead uses deception to gain access by gaining confidential access information.