a. pfSense
2. What version of firewall did Global Enterprises install?
a. 2.0
3. What is the current version number of the firewall software used by Global Enterprises?
a. 2.2
4. What email server does Global Enterprises use?
a. Courier
5. What are Global Enterprises Domain Name Servers?
a. A.NS.INETSEARCH.COM / B.NS.INETSEARCH.COM
6. Which Global Enterprises employee used to work for the Los Angeles Police Department?
a. No employee shows a past history of work for LAPD.
7. Where did LouAnne Garfinkle work before coming to Global Enterprises?
a. Rugs-R-Us
8. Job applicants often feel as if the job description were written especially for them, in LouAnne’s case that was true. Briefly describe what elements of the job ad from Part 2 of the lab might appeal specifically to LouAnne Garfinkle.
a. Specifically mentions a minimum of 20 years of experience, and a related degree. Also states that salary will be commensurate with experience.
9. What is the difference between social engineering and reverse social engineering?
a. Social engineering is used in the real world. Reverse social engineering is used in the cyber world.
b. Social engineering is used on most people. Reverse social engineering is used on people with specialized law enforcement training.
c. In social engineering the con artist goes to the target, in reverse social engineering the con artist gets the target to come to them.
d. In social engineering email is taken from the subject, in reverse social engineering the subject is sent email or SPAM.
e. Only script kiddies do social engineering, Reverse social engineering is done by professional cyber criminals.
10. What is the top objective of an anti-social engineering campaign within an organization?
a. Penalties
b. Awareness
c. Spying on co-workers
d. Spying on bosses
e. Spying on subordinates
f. All of c-e above
You May Also Find These Documents Helpful
-
| * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…
- 409 Words
- 2 Pages
Satisfactory Essays -
16) What would be the best explanation for the absence of complete information on computer crime?…
- 2281 Words
- 11 Pages
Good Essays -
a. The advantages to using reverse engineering is that one can repair certain bugs, see how a program operates and improve the operation of the program…
- 197 Words
- 1 Page
Satisfactory Essays -
Use the Web to research and evaluate security products from two competing vendors, such as antivirus software, firewalls, or antispyware software. For each product, describe its capabilities, for what types of businesses it is best suited, and its cost to purchase and install. Which is the best product? Why?…
- 428 Words
- 2 Pages
Satisfactory Essays -
Today, there is considerable debate whether job descriptions should be broader and more generic, versus narrow and more specific. Distinguish between the advantages and disadvantages of each approach, and which you see as the more preferable approach. Respond to at least two of your classmates’ postings.…
- 435 Words
- 2 Pages
Satisfactory Essays -
b. ____________________ occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.…
- 380 Words
- 2 Pages
Satisfactory Essays -
Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…
- 592 Words
- 2 Pages
Good Essays -
Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…
- 567 Words
- 3 Pages
Satisfactory Essays -
2. A university biology department wishes to hire a scientist to work on the relationships among the wolves, moose, trees and physical features on an island. If you were charged with writing the job description, you should title the position…
- 2856 Words
- 12 Pages
Good Essays -
Well trained employees play a huge factor in protecting the network. Many viruses and malware can be prevented just by paying attention and having a trained eye. It is important that employees can recognize and respond to social engineering techniques. Social engineering is a method that attackers use to gain information to make their attack successful. In other words, it is a method of gaining confidential information. Social engineering has been around for a very long time and it is the most basic way to bypass an organizations security.…
- 647 Words
- 3 Pages
Good Essays -
Q3. Which one of the following is not a reason for exemption under data protection legislation?…
- 507 Words
- 3 Pages
Satisfactory Essays -
b. Describe at least two tasks a person with this career might perform. (1-2 sentences.…
- 947 Words
- 3 Pages
Good Essays -
2. Reconnaissance would be the only legal way to obtain information about a target, footprinting would be rolled into this step.…
- 292 Words
- 1 Page
Satisfactory Essays -
C. This horrifying practice is justified under the disguise of scientific research and for commercial purposes.…
- 369 Words
- 2 Pages
Satisfactory Essays -
One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…
- 375 Words
- 2 Pages
Satisfactory Essays