ccna-discovery-4.blogspot.com
ccna discovery 1 chapter 7 v4.0
1) Identify three techniques used in social engineering. (Choose three.)
fishing
* vishing
* phishing
spamming
* pretexting
junk mailing
2) During a pretexting event, how is a target typically contacted?
by e-mail
* by phone
in person
through another person
3) While surfing the Internet, a user notices a box claiming a prize has been won.
The user opens the box unaware that a program is being installed. An intruder now
accesses the computer and retrieves personal information. What type of attack
occurred?
worm
virus
* Trojan horse
denial of service
Read more
ccna discovery, ccna discovery exam, ccna discovery
course, ccna discovery answers, ccna discovery lab, ccna
discovery v4.0, ccna discovery 1, ccna discovery 2, ccna
discovery 3, ccna discovery 4, ccna discovery curriculum,
ccna discovery chapter 5, ccna discovery chapter 6, ccna
discovery 4.1, ccna discovery chapter, ccna discovery v4