An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?
Reverse Social Engineering
Tailgating
Piggybacking
Announced
Correct answer: B
Question 2
Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?
Produces less false positives
Can identify unknown attacks
Requires vendor updates for a new threat
Cannot deal with encrypted network traffic
Correct answer: B
Question 3
You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.