Alpha and Beta are having a conversation in English. Gamma, who is a gifted conversationalist and tends to monopolize conversations, approaches Alpha and Beta. As soon as Alpha and Beta see Gamma, they start speaking in Spanish, but Gamma does not understand. What did Alpha and Beta just do?
Blog
A threat actor does research, including Google searches, and…
A threat actor does research, including Google searches, and discovers the cleaning establishment used by the company they want to target. The threat actor gets a job with the cleaning establishment for the sole purpose of obtaining any information that will help in their malicious efforts. What type of attack is the threat actor most likely to engage in?
An individual who was recently fired goes to their former pl…
An individual who was recently fired goes to their former place of employment on a weekend. Since they are unable to enter, security goes to the front door to inquire. The fired employee says they forgot their access card and just needs to pick up their tablet in their office. What attack surface is the former employee trying to exploit?
You are tasked with installing a system in a large warehouse…
You are tasked with installing a system in a large warehouse that is capable of detecting levels of daylight to dim interior lights to conserve energy. In addition, if an intruder enters the warehouse an alarm should be triggered. The system you install will most likely support what type of signal/radio wave?
Which one of the following technologies is most likely to be…
Which one of the following technologies is most likely to be used in a system that is able to detect when a vehicle enters a restricted area and the direction in which it is headed?
Karlo installs an alarm system that is capable of emitting a…
Karlo installs an alarm system that is capable of emitting and detecting a signal in the light spectrum. The capability serves the purpose of detecting motion and how close an object is in a limited space. Which of the following best describes the type of signal the emitter can transmit?
A series of individuals (engineers and executives) from a la…
A series of individuals (engineers and executives) from a large electronics firm are members of a professional organization. They visit the website of the organization, often to contribute papers, do research, and sign up for a variety of conferences. An attacker attempts to target the individuals by infecting the website. What type of attack is this?
A broker launches a variety of attacks to find a weakness th…
A broker launches a variety of attacks to find a weakness that will lead to financial gain. What activity is the broker most likely to engage in?
Company A wants to be first to market with a product forecas…
Company A wants to be first to market with a product forecasted to be very profitable. A few bad actors in Company A launch an attack against Company B to steal intellectual property that will help them. What type of threat actor would do something like this?
Which of the following best describes what a nation-state ac…
Which of the following best describes what a nation-state actor is most likely to do if their attacks against a target are not successful?