Having the documents shredded or incinerated before disposal makes this physical security threat less effective and mitigates the risk of social engineering attacks.
Dumpster diving
A company utilizes a backup rotation scheme where backups performed daily during a week are used to create a weekly backup and backups created at the end of each week are used to create a monthly backup. The answer that refers to this backup rotation scheme should feel familiar...
Grandfather-Father-Son
The most common troubleshooting step used to solve mobile OS and application issues?
Retarting the phone
Identify what control panel applet is referred to by the following attributes
Windows Defender Firewall
Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.
.vbs
The practice of using a telephone system to manipulate user into disclosing confidential information is known as:
Vishing
The characteristics listed below can be used to describe this strategy:
3-2-1 backup
The process of removing software restrictions imposed by Apple on its iOS operating system?
Jailbreaking
Identify what control panel applet is referred to by the following attributes
Devices and Printers
A type of script filename extension that would be used to create a script file that extends the scope of interaction between a user and a web page?
.js
Phishing scams targeting people holding high positions in an organization or business are known as:
Whaling
An up-to-date full backup copy that combines the last full backup with subsequent incremental and/or differential backups is referred to as:
Synthetic full backup copy
What is the name of an iOS/Android feature that provides access to advanced system settings hidden by default from regular users?
Identify what control panel applet is referred to by the following attributes
Programs and Features
Which of the answers listed below refers to the filename extension of a Microsoft PowerShell script file?
.ps1
Gaining unauthorized access to restricted areas by following another person
Tailgating
This back up strategy requires a working copy of the last full backup and the most recent copy of the incremental backup.
Differential backup strategy
The process of granting regular users elevated privileges on an Android-based mobile device is called:
Rooting
Identify what control panel applet is referred to by the following attributes:
Network and Sharing Center
Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2, and Microsoft Windows?
.bat
A rogue Wireless Access Point set up for eavesdropping or stealing sensitive user data which replaces the legitimate access point and by advertising its own presence with the same SSID.
Evil Twin
A backup strategy that requires all copies of backups made since the last full backup, along with the last full backup itself, is called what?
Incremental backup
A package file format used by Android OS for distribution and installation of mobile apps is known as:
apk
Identify what control panel applet is referred to by the following attributes:
System Control Panel
Which of the following answers refers to a script file type designed to be run in Unix command line?
.sh