A user receives a phone call from a person claiming to be from tech support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?
a. Malware
b. Phishing
c. Virus
d. Social engineering
Answer: d. Social engineering
Computer Science & Information Technology
You might also like to view...
Context-sensitive help opens the Help topic related to the feature being used.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
To insert slides from another presentation into a current presentation, click the New Slide list arrow in the Slides group, then click Insert Slides. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What type of network device keeps a table of the MAC addresses of the devices connected to it?
A. hub B. router C. NIC D. switch
Computer Science & Information Technology
Denial of service (DoS) attack means an attack designed to overwhelm the target system so it can no longer reply to legitimate requests for connection.
a. true b. false
Computer Science & Information Technology