Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone number displayed on the caller ID matches the vendor's number. When the purchasing agent asks to call the vendor back, they are given a different phone number with a different area code. Which of the following attack types is this?

A. Hoax
B. Impersonation
C. Spear phishing
D. Whaling


Answer: B. Impersonation

Computer Science & Information Technology

You might also like to view...

Figure8.2 illustrates how ?les areshared between a parent process and its child process. Write a program to validate that all open ?le descriptors in the parent and child point to the same ?les, and that the ?le status ?ags and offsets areshared

What will be an ideal response?

Computer Science & Information Technology

Create a new binaryFind method in the Searcher class that works on any object of the type Comparable and takes a List of Comparable objects.

What will be an ideal response?

Computer Science & Information Technology

A serialized object is ________.

a. an object represented by XML that includes the object’s data. b. an object in memory that has been recreated from data in a file c. a standard output stream object used to convert objects in code to data in a file d. None of the above.

Computer Science & Information Technology

The ________ can be used to change the size of a placeholder

A) Grasp Object button B) rotate handle C) sizing handles D) Adjust Placeholder group

Computer Science & Information Technology