Question 71

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
  • Question 72

    Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
  • Question 73

    Which regex matches only on all lowercase letters?
  • Question 74

    An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
    What is the impact of this traffic?
  • Question 75

    How does an SSL certificate impact security between the client and the server?