OD41

5 November 2025

CompTIA A+ Core 2: Social Engineering Attacks

 

Question:

What are some of the impacts that an XSS attack could have on an organization?

  • Hijacking accounts

  • Spreading of malware


Question

:

Which data might you find while dumpster diving?

  • Medical records

  • Phone numbers

  • Credit card statements


Question

:

What are some signs that you may be under a distributed denial of service attack?

  • Sudden surge in requests

  • Slow performance

  • Odd web facing network traffic patterns


Question

:

Which characteristics would make a building more susceptible to tailgating attacks?

  • Large number of active employees

  • Multiple entrances

  • Busy office space


Question

:

Which are some of the typical types of social engineering attacks? 

  • Phishing

  • Tailgating

  • Pretexting


Question

:

Which device can you install on a monitor to help protect against shoulder surfing?

  • Privacy Screen


Question

:

Which malicious actors might undertake a zero-day attack?

  • Nation states conducting cyber warfare

  • Hacktivists

  • Cybercriminals


Question

:

How might an attacker fake a secure connection?

  • SSL hijacking

  • SSL striping

  • HTTPS spoofing


Question

:

How can you protect yourself from a brute force attack?

  • Don’t reuse passwords

  • Use two-factor authentication

  • Use long complex passwords


Question

:

How can you prevent a SQLi attack?

  • Scan regularly for vulnerabilities

  • Use strict allowlists


Question

:

Which type of spoofing attack might an attacker attempt?

  • Email spoofing

  • Website spoofing

  • IP address spoofing


Question

:

Which types of phishing attack might be undertaken by an attacker?

  • Spearphishing

  • Whaling


Question

:

Which steps can be taken to help prevent whaling attacks?

  • Senior management training

  • Enhanced email security

  • Data protection software


Question

:

Which steps would an attacker take in an evil twin attack?

  • Attacker lures victims into connecting to evil twin

  • Attacker creates a fake Captive Portal


Question

:

How can you protect your organization from insider threats?

  • Monitor critical assets with video

  • Create a culture of security


Question

:

When conducting an impersonation attack, who might an attack impersonate to have the best results?

  • Influential persons

  • Well-known brands

  • Third-party vendors