Chapter 9 ■ Practice Test 1 209
- What type of log is shown in the figure?
A. Firewall log
B. Change log
C. Application log
D. System log
- Alex works for the United States (U.S.) federal government and is required to ensure that
the devices and components he acquires are not compromised. What program will he par-
ticipate in to help ensure this?
A. TEMPEST
B. Trusted foundry
C. GovBuy
D. MITRE - When an attacker calls an organization’s help desk and persuades them to reset a password
for them due to the help desk employee’s trust and willingness to help, what type of attack
succeeded?
A. A human Trojan
B. Social engineering
C. Phishing
D. Whaling - When a user attempts to log into their online account, Google sends a text message with a
code to their cell phone. What type of verification is this?
A. Knowledge-based authentication
B. Dynamic knowledge–based authentication
C. Out-of-band identity proofing
D. Risk-based identity proofing