QUESTION 24 Which statement describes how an attacker can open up a backdoor? A user can install an unsecured wireless access point so that they can access the organization's network from many difterent areas O An attacker can follow closely behind a person who has just used their own access card or PIN to gain physical access to a room or building. An attacker leave the door to a room or building ajar. An attacker follows closely behind a person who has just used their own access card or PIN to gain physical access to a room or building. QUESTION 25 Which statement describes how dumpster diving is accomplished? An attacker directly observes the target entering sensitive information on a form, keypad, or keyboard. O An attacker changes URLs in a server's domain name table. O An attacker watches what a user discards into the Windows recycle bin on the user's computer. OAn attacker attempts to find ittle bits of information that could be useful for an attack in a target trash carn QUESTION 26 Which statement describes how piggybacking is accomplished? O An attacker modifies local host files, which are used to convert URLs to the appropriate IP address. An attacker attenpts to find ittie bits of information in a target trash can. O An attacker follows closely behind a person who has just used their own access card or PIN to gain physical access to a room or building. O An attacker masquerades as a trusted entity in an e-mail or instant message sent to a large group of often random usors. QUESTION 27 Which statement describes how reverse social engineering is accomplished? O An attackor attempts to find ittle bits of information that could be usoful for an attack in a target trash carn An attacker tries to convince the target to initiate contact and then gets the target to give up confidential information. O An attacker uninstals software on an unsuspecting user's computer OAn attacker init ates a conversation with the target to obtain confidential information. QUESTION 28 Which statement describes how shoulder surfing is accomplished? O An attacker attempts to find ittie bits of information in a target trash can. An attacker directly observes the target entering sensitive information on a form, keypad, or keyboard. O An attacker follows closely behind a porson who has just used their own access card or PIN to gain physical access to a room or building. An attacker masquerades as a trusted entity in an e-mail or instant message sent to a large group of often random users. QUESTION 29 Which statement describes the security risk of installing games on an organization's system? The games may not be compatible with the operating system version. O The software may contain a piece of malicious code capable of opening a backdoor. O The users may play during work hours instead of during broaks O The games may take up too much memory on the computer and slow down processing making it difticult to work