Look, a USB key!

You’ve found a USB memory stick in the parking lot at your office. Which of these security exploits may be at work?

A) Spyware

B) Virus

C) Social engineering

D) Application vulnerability

E) Finders-keepers

The answer: C) Social engineering

One of the most difficult security exploits to identify is the one that has very little to do with technology. Enticing someone into putting a USB memory stick into their office computer is one of the more common social engineering techniques. Once the social engineering exploit has worked, the USB key will usually load some type of malicious software onto the computer.

Want to know more? Watch “Motherboard Form Factors.”

There are fundamental security techniques that every CompTIA A+ certified professional should know. In this video, you’ll learn about encryption technologies, data wiping, authentication technologies, and much more.