A user receives a phone call from a person claiming to be from tech support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?

a. Malware
b. Phishing
c. Virus
d. Social engineering


Answer: d. Social engineering

Computer Science & Information Technology

You might also like to view...

Context-sensitive help opens the Help topic related to the feature being used.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To insert slides from another presentation into a current presentation, click the New Slide list arrow in the Slides group, then click Insert Slides. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What type of network device keeps a table of the MAC addresses of the devices connected to it?

A. hub B. router C. NIC D. switch

Computer Science & Information Technology

Denial of service (DoS) attack means an attack designed to overwhelm the target system so it can no longer reply to legitimate requests for connection.

a. true b. false

Computer Science & Information Technology