A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
Answer: C. Social engineering
Computer Science & Information Technology
You might also like to view...
____ decides who should be trusted.
A. Logical security B. Virtual security C. Physical security D. Personnel security
Computer Science & Information Technology
The ________ button will remove the window from the screen but will not close the application or the file
Fill in the blank(s) with correct word
Computer Science & Information Technology
Using the ________ Presentation for CD feature permits viewing PowerPoint presentations on computer systems without PowerPoint software
Fill in the blank(s) with correct word
Computer Science & Information Technology
With blend steps, higher numbers produce smoother transitions.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology