1.
Who is responsible for establishing access permissions to network resources in the Discretionary Access Control (DAC) access control model?
Correct Answer
B. The owner of the resource
Explanation
In the Discretionary Access Control (DAC) access control model, the owner of the resource is responsible for establishing access permissions to network resources. This means that the owner has the discretion to determine who can access the resource and what level of access they have. The system administrator may assist in managing and enforcing these permissions, but ultimately it is the owner's responsibility to set them. The user requiring access to the resource does not have the authority to establish access permissions in this model.
2.
Users need to access their email and several secure applications from any workstation on the network. In addition, an authentication system implemented by the administrator requires the use of a username, password, and a company issued smart card. This is an example of which of the following?
Correct Answer
A. SSO
Explanation
This scenario is an example of Single Sign-On (SSO). SSO allows users to access multiple applications and systems with a single set of credentials. In this case, the users need to access their email and secure applications, and the authentication system requires a username, password, and a company-issued smart card. With SSO, users only need to authenticate once, using their smart card, and they can then access all the necessary resources without having to re-enter their credentials for each application or system. This improves convenience and security by reducing the need for multiple passwords and credentials.
3.
As a network administrator, your company uses the RBAC (Role Based Access Control) model. You must plan the security strategy for user to access resources on the network. These resources include mailboxes and files and printers. The departments in your company are Finance, Sales, Research and Development, and Production. Users access the resources based on the department wherein he/she works. Which roles should you create to support the RBAC (Role Based Access Control) model?
Correct Answer
C. Create Finance, Sales, Research and Development, and Production roles
Explanation
The RBAC (Role Based Access Control) model is based on assigning roles to users based on their job responsibilities or departments. In this scenario, the company has different departments such as Finance, Sales, Research and Development, and Production. To support the RBAC model, it is necessary to create roles for each department. This will allow users to access resources such as mailboxes, files, and printers based on the department they work in. Therefore, creating Finance, Sales, Research and Development, and Production roles is the correct answer.
4.
Choose the terminology or concept which best describes a (Mandatory Access Control) MAC model.
Correct Answer
D. Lattice
Explanation
A Lattice model is the most appropriate terminology to describe a Mandatory Access Control (MAC) model. In a MAC model, access to resources is based on predefined rules and policies that are enforced by the system. A Lattice model represents the different levels of security and access permissions in a hierarchical structure, with each level having a defined set of rules and restrictions. This ensures that access to resources is strictly controlled and only allowed based on the security clearance level of the user. The Bell La-Padula, BIBA, and Clark and Wilson models are also security models but are not specifically related to MAC.
5.
Which of the following will restrict access to files according to the identity of the user or group?
Choose one answer.
Correct Answer
A. DAC
Explanation
DAC stands for Discretionary Access Control, which is a method of restricting access to files based on the identity of the user or group. With DAC, the owner of a file or directory can set permissions to determine who can access it and what actions they can perform. This allows for fine-grained control over access to files, ensuring that only authorized users or groups can access sensitive information. DAC is a commonly used access control mechanism in operating systems and file systems.
6.
Users would not like to enter credentials to each server or application to conduct their normal work. Which type of strategy can solve this problem?
Correct Answer
C. SSO
Explanation
Single Sign-On (SSO) is a strategy that can solve the problem of users having to enter credentials for each server or application they need to access. With SSO, users only need to authenticate once, usually through a central authentication server, and then they can access multiple systems and applications without having to enter their credentials again. This saves time and improves user experience by eliminating the need for repetitive login processes.
7.
Giving each user or group of users only the access they need to do their job is an example of which of the following security principals?
Correct Answer
A. Least privilege
Explanation
The principle of least privilege states that users should only be given the minimum level of access necessary to perform their job functions. By giving each user or group of users only the access they need, organizations can minimize the risk of unauthorized access or misuse of sensitive information. This principle helps to limit the potential damage that can be caused by a compromised account or insider threat.
8.
Which security measure should be used while implementing access control?
Correct Answer
B. Password complexity requirements
Explanation
Password complexity requirements should be used while implementing access control because they help ensure that passwords are strong and not easily guessable. By requiring users to create passwords that include a combination of uppercase and lowercase letters, numbers, and special characters, the likelihood of unauthorized access is reduced. Password complexity requirements also encourage users to regularly update their passwords, further enhancing security.
9.
Which of the following is correct about an instance where a biometric system identifies unauthorized users and allows them access?
Choose one answer.
Correct Answer
A. False acceptance
Explanation
False acceptance refers to a situation where a biometric system incorrectly identifies unauthorized users as authorized and grants them access. In other words, the system fails to accurately distinguish between authorized and unauthorized individuals, leading to false acceptance of unauthorized users.
10.
Which of the following access control models uses subject and object labels?
Choose one answer.
Correct Answer
B. Mandatory Access Control (MAC)
Explanation
Mandatory Access Control (MAC) is the correct answer because it is an access control model that uses subject and object labels. In MAC, each subject and object is assigned a label, and access decisions are based on these labels. The labels determine the level of sensitivity or classification of the subject or object, and access is granted or denied based on the rules defined by the system administrator. This ensures that only subjects with the appropriate labels can access objects with matching labels, providing a high level of security and control.
11.
Which password management system best provides for a system with a large number of users?
Choose one answer.
Correct Answer
C. Self service password reset management systems
Explanation
Self service password reset management systems are the best option for a system with a large number of users because they allow users to reset their passwords on their own without the need for assistance from IT support. This helps to reduce the workload on IT staff and improves efficiency. Additionally, self service password reset systems often include security measures such as multi-factor authentication to ensure the security of the password reset process.
12.
Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
Correct Answer
D. Multifactor
Explanation
Multifactor authentication is the best description for providing a username, password, and undergoing a thumbprint scan to access a workstation. This is because multifactor authentication involves using multiple factors or methods to verify the identity of a user. In this case, the username and password serve as one factor, while the thumbprint scan serves as another factor. By combining these two factors, the authentication process becomes more secure and reliable, as it requires both something the user knows (password) and something the user possesses (thumbprint) to gain access to the workstation.
13.
Which of the following access decisions are based on a Mandatory Access control (MAC) environment?
Correct Answer
A. Sensitivity labels
Explanation
Sensitivity labels are a characteristic of Mandatory Access Control (MAC) environments. MAC is a security model where access to resources is determined by the sensitivity labels assigned to both the resources and the users. Sensitivity labels define the level of sensitivity or classification of the information, and access is granted or denied based on the comparison of these labels. Therefore, sensitivity labels are a key component of MAC environments and are used to make access decisions. Ownership, group membership, and access control lists are more commonly associated with discretionary access control (DAC) environments.
14.
Which of the following access control models uses roles to determine access permissions?
Correct Answer
A. RBAC
Explanation
RBAC (Role-Based Access Control) is an access control model that uses roles to determine access permissions. In RBAC, users are assigned specific roles, and these roles define the permissions and privileges that the users have within the system. By assigning roles to users, access can be easily managed and controlled, as permissions are granted based on the roles assigned to the user. This model provides a more efficient and scalable way to manage access control compared to individually assigning permissions to each user.
15.
The ability to logon to multiple systems with the same credentials is typically known as:
Correct Answer
D. Single sign-on
Explanation
Single sign-on refers to the ability to log in to multiple systems or applications using the same set of credentials. This eliminates the need for users to remember and enter different usernames and passwords for each system, improving convenience and user experience. With single sign-on, users only need to authenticate once, and their credentials are then used to access multiple systems seamlessly. This reduces the risk of password fatigue and simplifies the management of user accounts.
16.
The DAC (Discretionary Access Control) model has an inherent flaw. Choose the option that describes this flaw.
Correct Answer
A. The DAC (Discretionary Access Control) model uses only the identity of the user or specific process to control access to a resource. This creates a security loopHole for Trojan horse attacks.
Explanation
The correct answer is that the DAC (Discretionary Access Control) model uses only the identity of the user or specific process to control access to a resource, which creates a security loophole for Trojan horse attacks. This means that if a user or process is compromised by a Trojan horse, the attacker can gain unauthorized access to resources that the compromised user or process has access to. This flaw in the DAC model highlights the risk of relying solely on user or process identity for access control, as it can be easily exploited by attackers.
17.
Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item.
Correct Answer
D. MACs (Mandatory Access Control) method
Explanation
The MAC (Mandatory Access Control) method allows access control determinations to be performed based on the security labels associated with each user and each data item. In this method, access decisions are based on predefined rules and policies set by the system administrator or security administrator. These security labels define the sensitivity and classification of the data and the clearance level of the user. The MAC method ensures that access is granted or denied based on the security labels, regardless of the user's role or permissions.
18.
Which of the following authentication methods increases the security of the authentication process because it must be in your physical possession?
Correct Answer
D. Smart Cards
Explanation
Smart cards increase the security of the authentication process because they must be in your physical possession. Smart cards are small, portable devices that contain an embedded microchip. They require a user to insert the card into a card reader and provide a personal identification number (PIN) to access the information stored on the card. This two-factor authentication method adds an extra layer of security by requiring both something you have (the physical card) and something you know (the PIN) to authenticate. This makes it more difficult for unauthorized individuals to gain access to sensitive information or systems.
19.
Which access control system allows the system administrator to establish access permissions to network resources?
Choose one answer.
Correct Answer
A. MAC
Explanation
MAC (Mandatory Access Control) is the correct answer because it is an access control system that allows the system administrator to establish access permissions to network resources. MAC enforces access control based on predefined security policies, where each user and resource is assigned a security label. The system administrator can then define rules and permissions based on these labels, determining who can access which network resources.
20.
Which access control method gives the owner control over providing permissions?
Correct Answer
D. Discretionary Access Control (DAC)
Explanation
Discretionary Access Control (DAC) is an access control method that gives the owner of a resource the control over granting or denying permissions to other users. In DAC, the owner has the discretion to determine who can access the resource and what level of access they have. This means that the owner can assign specific permissions to individuals or groups based on their needs and responsibilities. Unlike other access control methods, DAC allows for flexibility and customization in granting permissions, as it puts the control in the hands of the owner.
21.
The authentication process where the user can access several resources without the need for multiple credentials is known as:
Correct Answer
A. Single sign-on
Explanation
Single sign-on is the correct answer because it refers to the authentication process where a user can access multiple resources without having to enter separate credentials for each resource. This streamlines the user experience and improves efficiency by eliminating the need for multiple logins. With single sign-on, users only need to authenticate once, and then they can seamlessly access various resources and applications without the need for additional credentials.
22.
What does the DAC access control model use to identify the users who have permissions to a resource?
Correct Answer
C. Access Control Lists
Explanation
The DAC access control model uses Access Control Lists (ACLs) to identify the users who have permissions to a resource. ACLs are a list of permissions attached to an object that specify which users or groups are granted access rights to that object. This allows the system to control and manage access to resources based on user identities and their corresponding permissions listed in the ACL.
23.
Access controls based on security labels associated with each data item and each user are known as:
Correct Answer
C. Mandatory Access Control (MAC)
Explanation
Mandatory Access Control (MAC) is a type of access control that uses security labels associated with each data item and each user to determine access permissions. In MAC, access decisions are based on predefined rules and policies set by the system administrator, rather than the discretion of individual users or their roles. This ensures a higher level of security as access is strictly controlled and enforced based on the sensitivity of the data and the clearance level of the user.
24.
An organization has a hierarchical-based concept of privilege management with administrators having full access, human resources personnel having slightly less access and managers having access to their own department files only. This is BEST described as:
Correct Answer
D. Role based access control (RBAC)
Explanation
The given scenario describes a privilege management system in which different roles have different levels of access. Administrators have full access, human resources personnel have slightly less access, and managers have access to their own department files only. This aligns with the concept of Role based access control (RBAC), where access is granted based on the roles individuals have within the organization. RBAC allows for more granular control and is commonly used in hierarchical organizations to manage privileges effectively.
25.
The difference between identification and authentication is that:
Correct Answer
C. Authentication verifies a set of credentials while identification verifies the identity of a user requesting credentials
Explanation
Authentication is the process of verifying the identity of a user requesting credentials, such as a username and password. It ensures that the user is who they claim to be. On the other hand, identification is the process of verifying the identity of the user requesting the credentials. It confirms the user's identity before granting them access. Therefore, the correct answer is that authentication verifies a set of credentials while identification verifies the identity of a user requesting credentials.
26.
What does the MAC access control model use to identify the users who have permissions to a resource?
Correct Answer
C. Predefined access privileges
Explanation
The MAC access control model uses predefined access privileges to identify the users who have permissions to a resource. This means that access to resources is granted based on predetermined levels of access that are assigned to users. These access privileges determine what actions a user can perform on a resource, such as read, write, or delete. By using predefined access privileges, the MAC access control model ensures that only authorized users with the appropriate level of access can access a resource.
27.
How is access control permissions established in the RBAC access control model?
Correct Answer
A. The role or responsibilities users have in the organization
Explanation
Access control permissions in the RBAC access control model are established based on the role or responsibilities that users have in the organization. This means that users are granted specific permissions based on their assigned roles, allowing them to access certain resources and perform certain actions. The RBAC model focuses on managing access based on user roles rather than individual user identities, making it easier to administer and control access rights in large organizations.
28.
Both the server and the client authenticate before exchanging data. This is an example of which of the following?
Correct Answer
C. Mutual authentication
Explanation
Mutual authentication refers to a process where both the server and the client verify each other's identities before exchanging data. In this case, both the server and the client authenticate themselves, ensuring that they are communicating with the intended party and not an imposter. This helps establish a secure and trusted connection between the two parties, preventing unauthorized access and ensuring data confidentiality and integrity. Mutual authentication is commonly used in secure communication protocols like SSL/TLS to provide a robust level of security.
29.
Which solution can be used by a user to implement very tight security controls for technicians that seek to enter the users’ datacenter?
Correct Answer
C. Biometric reader and smartcard
Explanation
Biometric reader and smartcard can be used to implement very tight security controls for technicians that seek to enter the users' datacenter. Biometric reader ensures that only authorized individuals with their unique biometric data can gain access, eliminating the risk of stolen or shared access cards. Smartcards provide an additional layer of security by requiring a physical card to be present, which can be further authenticated through PIN or password. This combination of biometric reader and smartcard ensures a high level of security and prevents unauthorized access to the datacenter.
30.
Which of the following statements regarding the MAC access control models is TRUE?
Correct Answer
B. In the Mandatory Access Control (MAC) users cannot share resources dynamically.
Explanation
The statement that "In the Mandatory Access Control (MAC) users cannot share resources dynamically" is true. In MAC, access to resources is determined by the system administrator or owner of the resource, rather than the individual user. Users do not have the ability to dynamically share resources with others without proper authorization. This is one of the key characteristics of the MAC model, where access privileges are strictly controlled and enforced based on predefined rules and policies.
31.
Which security action should be finished before access is given to the network?
Correct Answer
C. Identification and authentication
Explanation
Before access is given to the network, the security action that should be finished is the process of identification and authentication. Identification involves providing a unique identifier, such as a username, to establish the user's identity. Authentication, on the other hand, verifies the user's claimed identity by validating credentials, such as a password or biometric information. This two-step process ensures that only authorized individuals are granted access to the network, enhancing overall security.
32.
Which item is not a logical access control method?
Correct Answer
C. Biometrics
Explanation
Biometrics is not a logical access control method because it is a physical access control method. Logical access control methods involve the use of software or digital credentials to authenticate and authorize users, while biometrics relies on physical characteristics such as fingerprints, facial recognition, or iris scans. Therefore, biometrics does not fall under the category of logical access control methods like software tokens, ACL, or group policy.
33.
In a classified environment, a clearance into a Top Secret compartment only allows access to certain information within that compartment. This is known as:
Correct Answer
B. Need to know
Explanation
In a classified environment, individuals with a clearance into a Top Secret compartment are only granted access to specific information within that compartment based on their "need to know." This means that they are only given access to information that is necessary for them to perform their duties and responsibilities, ensuring that sensitive information is only shared with those who require it. This principle helps to protect classified information and prevent unauthorized access or disclosure.
34.
Which of the following describes the process by which a single user name and password can be entered to access multiple computer applications?
Correct Answer
A. Single sign-on
Explanation
Single sign-on is the process by which a single user name and password can be used to access multiple computer applications. This eliminates the need for users to remember multiple login credentials for different applications, simplifying the authentication process and improving user experience. With single sign-on, users only need to authenticate once, and their credentials are then securely shared across multiple applications, allowing them to seamlessly access various systems without the need for repeated logins.
35.
A user is assigned access rights explicitly. This is a feature of which of the following control models?
Correct Answer
C. Discretionary Access Control (DAC)
Explanation
In Discretionary Access Control (DAC), access rights are assigned explicitly by the owner of the resource. This means that the owner has the discretion to grant or revoke access to other users. In contrast, in Rule Based Access Control (RBAC), access rights are assigned based on predefined rules and roles, while in Mandatory Access Control (MAC), access rights are assigned based on system-wide policies and labels. Therefore, the fact that a user is assigned access rights explicitly aligns with the features of Discretionary Access Control (DAC).
36.
Most key fob (token) based identification systems use which of the following types of authentication mechanisms?
Correct Answer
E. Token
Explanation
Token-based identification systems use tokens as a form of authentication mechanism. Tokens can be physical devices, such as key fobs or smart cards, or they can be virtual tokens generated by software applications. These tokens are used to verify the identity of the user and grant access to the system or resources. This is different from other authentication mechanisms like username/password, certificates, biometrics, or Kerberos, which do not specifically rely on tokens for authentication.
37.
During which phase of identification and authentication does proofing occur?
Correct Answer
C. Identification
Explanation
During the phase of identification, proofing occurs. This is the process of verifying the identity of an individual or entity. It involves gathering and validating information such as usernames, passwords, or biometric data to ensure that the claimed identity is legitimate. Proofing helps to establish a reliable link between the identity and the person or entity being authenticated.
38.
Which item best describes an instance where a biometric system identifies legitimate users as being unauthorized
Correct Answer
C. False rejection
Explanation
False rejection is the correct answer because it refers to a situation where a biometric system incorrectly identifies legitimate users as unauthorized. This means that the system is rejecting valid users, which can occur due to various reasons such as technical errors, incorrect calibration, or mismatched biometric data. False acceptance, on the other hand, would describe a scenario where unauthorized users are mistakenly identified as legitimate. False negative is a broader term that can refer to both false rejection and false acceptance, but in this specific context, false rejection is the most accurate description.
39.
Which item can be commonly programmed into an application for ease of administration?
Correct Answer
A. Back door
Explanation
A back door can be commonly programmed into an application for ease of administration. A back door is a hidden entry point in a software or system that allows authorized individuals to bypass normal authentication measures and gain access to the system. It is often used by system administrators or developers to troubleshoot or perform maintenance tasks without going through normal procedures. This can make administration tasks easier and more efficient, as it provides a convenient way to access and manage the application.
40.
Which of the following definitions BEST suit Buffer Overflow?
Correct Answer
B. It receives more data than it is programmed to accept
Explanation
Buffer Overflow occurs when a program or process receives more data than it is programmed to accept. This can lead to the excess data overflowing into adjacent memory locations, potentially causing the program to crash, behave unexpectedly, or even allow an attacker to execute malicious code.
41.
Which description is correct about an application or string of code that could not automatically spread from one system to another but is designed to spread from file to file?
Correct Answer
C. Virus
Explanation
A virus is a type of malicious code or program that is designed to spread from file to file, typically through human interaction such as downloading or sharing infected files. Unlike a botnet, which is a network of compromised computers controlled by a central server, a virus does not automatically spread from one system to another. Instead, it relies on users unknowingly executing or opening infected files, allowing the virus to replicate and spread to other files on the same system. This distinguishes it from a worm, which is capable of self-replicating and spreading automatically across multiple systems. Adware, on the other hand, is a type of software that displays unwanted advertisements, and is not designed to spread from file to file.
42.
The risks of social engineering can be decreased by implementing: (Select TWO)
Correct Answer(s)
B. Identity verification methods
E. Security awareness training
Explanation
Implementing identity verification methods and security awareness training can decrease the risks of social engineering. Identity verification methods require individuals to prove their identity before accessing sensitive information or resources, reducing the chances of unauthorized access. Security awareness training educates individuals about social engineering tactics and how to recognize and respond to them, making them less susceptible to manipulation or deception. Both measures contribute to strengthening an organization's defenses against social engineering attacks.
43.
Which one of the following options is an attack launched from multiple zombie machines in attempt to bring down a service?
Correct Answer
A. DDoS
Explanation
A DDoS (Distributed Denial of Service) attack is launched from multiple zombie machines with the intention of overwhelming a service and causing it to become unavailable to legitimate users. This is done by flooding the target server or network with a high volume of traffic, making it unable to handle legitimate requests. Unlike a DoS (Denial of Service) attack, which is launched from a single source, a DDoS attack utilizes multiple sources to amplify its impact and make it more difficult to mitigate. Man-in-the-middle and TCP/IP hijacking are different types of attacks that involve intercepting and manipulating network traffic.
44.
In addition to bribery and forgery, which of the following are the MOST common techniques that attackers use to socially engineer people? (Select TWO)
Correct Answer(s)
A. Flattery
E. Assuming a position of authority
Explanation
Attackers commonly use flattery and assuming a position of authority as techniques to socially engineer people. Flattery involves complimenting and manipulating individuals to gain their trust and cooperation. Assuming a position of authority involves pretending to be someone with power or influence to deceive and manipulate others. These techniques are effective in manipulating individuals into disclosing sensitive information or performing actions that benefit the attacker.
45.
Due to a concern about staff browsing inappropriate material on the web, your company is purchasing a product which can decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. What type of attack is similar to this product?
Correct Answer
B. Man-in-the-middle
Explanation
The correct answer is "Man-in-the-middle." This is because a man-in-the-middle attack involves an attacker intercepting communication between two parties without their knowledge. In this scenario, the product being purchased acts as a man-in-the-middle by decrypting the SSL session, scanning the content, and then repackaging the SSL session without the staff knowing. This allows the company to monitor and control the web browsing activities of its staff.
46.
Which of the following viruses has the characteristic where it may attempt to infect your boot sector, infect all of your executable files, and destroy your applications files form part of?
Correct Answer
A. Multipartite Virus
Explanation
A Multipartite Virus is a type of virus that has the characteristic of attempting to infect the boot sector, executable files, and destroying application files. Unlike other viruses that focus on one specific area, the Multipartite Virus spreads and causes damage in multiple ways. It is a highly destructive virus that can cause significant harm to a computer system by infecting various components and rendering them useless.
47.
Which description is correct about a tool used by organizations to verify whether or not a staff member has been involved in malicious activity?
Correct Answer
D. Mandatory vacations
Explanation
Mandatory vacations are a tool used by organizations to verify whether or not a staff member has been involved in malicious activity. By requiring employees to take regular vacations, organizations can ensure that other staff members have the opportunity to step into their roles and perform their duties. This can help to identify any unauthorized or malicious activities that may have been taking place while the employee is away. Additionally, mandatory vacations can also serve as a deterrent for employees who may be tempted to engage in malicious activities, as they know that their absence will be noticed and potentially investigated.
48.
Which of the following is MOST effective in preventing adware?
Correct Answer
C. Firewall
Explanation
A firewall is the most effective in preventing adware because it acts as a barrier between a trusted internal network and an untrusted external network, filtering out malicious traffic and preventing unauthorized access to the system. Adware often enters a system through network connections, and a firewall can block these malicious connections, reducing the risk of adware infections. While antivirus software can also detect and remove adware, a firewall provides an additional layer of protection by blocking the initial entry point. HIDS (Host-based Intrusion Detection System) can detect unauthorized access or malicious activities within a system but may not specifically target adware. A pop-up blocker only prevents unwanted pop-up advertisements, but it may not fully prevent adware infections.
49.
Choose the most effective method of preventing computer viruses from spreading throughout the network
Correct Answer
B. You should enable scanning of all email attachments
Explanation
Enabling scanning of all email attachments is the most effective method of preventing computer viruses from spreading throughout the network. By scanning all email attachments, any potential viruses or malware can be detected and quarantined before they have a chance to infect the network. This helps to ensure that any malicious files are not able to enter the network through email communications, thus reducing the risk of virus spread. It is important to regularly update and maintain the antivirus software used for scanning to ensure its effectiveness against new and emerging threats.
50.
Choose the attack of malicious code that cannot be prevented or deterred solely through using technical measures
Correct Answer
A. Social engineering
Explanation
Social engineering is a type of attack where the attacker manipulates and deceives individuals into divulging sensitive information or performing actions that they normally wouldn't. Unlike other attacks listed, social engineering relies on human interaction and psychological manipulation rather than technical vulnerabilities. It cannot be prevented solely through technical measures because it exploits human trust and behavior, making it difficult to detect and defend against using traditional security measures such as firewalls or antivirus software.