Social Engineering Attacks and Document Destruction - Exam 220-1102 CompTIA A+ Core 2

Prevention of Social Engineering Attacks: Document Destruction

Question

Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

The correct answer is D. Dumpster diving.

Social engineering is a method of manipulating people into divulging confidential information or granting access to restricted systems. Dumpster diving is a form of social engineering that involves going through someone's trash in search of information that can be used for nefarious purposes.

Sensitive documents such as financial statements, credit card statements, personal identification information, and other documents containing private information can be valuable resources for attackers who are looking to steal identities or perform other illegal activities.

By destroying such documents, you can effectively reduce the risk of an attacker gaining access to this sensitive information. Proper document destruction methods include shredding or incinerating the documents to render them unreadable and unrecoverable.

Shoulder surfing, on the other hand, is a social engineering attack that involves an attacker watching over someone's shoulder as they enter passwords or other sensitive information. This attack can be prevented by ensuring that you are not being watched and by using privacy screens or angle-adjustable monitors to reduce the visibility of your screen.

Phishing is a social engineering attack that involves tricking people into revealing sensitive information by posing as a legitimate entity, such as a bank or an email provider. This attack can be prevented by being cautious when opening emails or clicking on links, verifying the legitimacy of the sender, and avoiding entering sensitive information into unsecured websites.

Tailgating is a social engineering attack that involves an attacker following someone into a restricted area without proper authorization. This attack can be prevented by ensuring that you are the only person who enters a secure area, verifying the identity of anyone requesting access, and using authentication mechanisms such as access cards or biometric scanners.