Question 1
1 / 1 pts
What process involves using or manipulating people inside the networking environment to gain
access to that network from the outside?
Hacking
Correct!
Social engineering
Inside attack
Internal virus
Question 2
1 / 1 pts
A technician servicing a user's computer notices the user has a lot of desktop icons linking to
inappropriate websites. Which of the following should the technician do NEXT?
Preserve the data and device
Correct!
Report through proper channels
Document all changes to the computer
Track the evidence
Question 3
1 / 1 pts
What is a software program that looks like one thing (such as a utility or a game) but is actually
doing something else (such as modifying CMOS settings)?
object access
social engineerin g
Worm
Spyware
Virus
Correct!
Trojan
Question 4
0 / 1 pts
When configured to do so, Windows will create an entry in the Security Log when someone
tries to access a certain file or folder-this is called auditing.
You Answered
Correct Answers
object access auditing