Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?
A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing
Answer: A. Whaling
You might also like to view...
You can use ________ view to change the layout of a form by moving, resizing, or adding controls
A) Datasheet B) Design C) Report D) Form
Which of the following is NOT true regarding the success of ransomwares?
a. Ransomware is most successful when the applicable victim lacks knowledge of or is apathetic to system security. b. Ransomware succeeds when the level of data destruction caused by sabotage cannot be recovered using commercially available software. c. Ransomware payments are typically made in hard cash directly to the perpetrator. d. In order for ransomware to be successful, the compromised data must have some worth to the victim.
MPEG video compression is ____.
A. lossy B. lossless C. conservative D. expensive
A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?
A. PAN B. WLAN C. MAN D. WMN