Recently, Jessica has been receiving reports at the help desk that clients cannot log in to their computers and need to rest their passwords. After checking the log file, Jessica decided to ask one client who had recently changed his password, why he decided to change it. The client reported that someone from the help desk had called him and asked him for his password two days ago. He gave the caller the password, and now he can’t log in to his system. Jessica has discovered that the client was a victim of social engineering.
?
What can the company do to prevent this from happening again?
A. Educate users.
B. Use multifactor authentication.
C. Install anti-malware software.
D. Install firewall software.
Answer: A
Computer Science & Information Technology
You might also like to view...
The communication protocol used to send and receive information across the internet is commonly called ________.
(a) COBOL. (b) TCP/IP. (c) ARPA. (d) ARPAnet.
Computer Science & Information Technology
A virus attack is also known as a ________
A) logic bomb B) moneyload C) time bomb D) payload
Computer Science & Information Technology
Which of the following is not a report view?
A) Report view B) Layout view C) Design view D) SQL view
Computer Science & Information Technology
Footprinting is information gathering that is only passive
Indicate whether the statement is true or false.
Computer Science & Information Technology