ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 506 - SY0-601 discussion

Report
Export

A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity incident response team. The caller asks the technician to verify the network's internal firewall IP address. Which of the following is the technician's best course of action?

A.
Direct the caller to stop by the help desk in person and hang up declining any further requests from the caller.
Answers
A.
Direct the caller to stop by the help desk in person and hang up declining any further requests from the caller.
B.
Ask for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone.
Answers
B.
Ask for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone.
C.
Write down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer.
Answers
C.
Write down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer.
D.
Request the caller send an email for identity verification and provide the requested information via email to the caller.
Answers
D.
Request the caller send an email for identity verification and provide the requested information via email to the caller.
Suggested answer: C

Explanation:

This is the best course of action for the help desk technician because it can help prevent a potential social engineering attack. Social engineering is a technique that involves manipulating or deceiving people into revealing sensitive information or performing actions that compromise security. The caller may be impersonating a member of the organization's cybersecurity incident response team to obtain the network's internal firewall IP address, which could be used for further attacks. The help desk technician should not provide any information over the phone without verifying the caller's identity and authorization. The help desk technician should also report the incident to the organization's cybersecurity officer for investigation and response. Reference:

https://www.comptia.org/blog/social-engineering-explained https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

asked 02/10/2024
Oliver Mark
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first