Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone number displayed on the caller ID matches the vendor's number. When the purchasing agent asks to call the vendor back, they are given a different phone number with a different area code. Which of the following attack types is this?
A. Hoax
B. Impersonation
C. Spear phishing
D. Whaling
Answer: B. Impersonation
You might also like to view...
Figure8.2 illustrates how ?les areshared between a parent process and its child process. Write a program to validate that all open ?le descriptors in the parent and child point to the same ?les, and that the ?le status ?ags and offsets areshared
What will be an ideal response?
Create a new binaryFind method in the Searcher class that works on any object of the type Comparable and takes a List of Comparable objects.
What will be an ideal response?
A serialized object is ________.
a. an object represented by XML that includes the object’s data. b. an object in memory that has been recreated from data in a file c. a standard output stream object used to convert objects in code to data in a file d. None of the above.
The ________ can be used to change the size of a placeholder
A) Grasp Object button B) rotate handle C) sizing handles D) Adjust Placeholder group