A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection


Answer: C. Social engineering

Computer Science & Information Technology

You might also like to view...

____ decides who should be trusted.

A. Logical security B. Virtual security C. Physical security D. Personnel security

Computer Science & Information Technology

The ________ button will remove the window from the screen but will not close the application or the file

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using the ________ Presentation for CD feature permits viewing PowerPoint presentations on computer systems without PowerPoint software

Fill in the blank(s) with correct word

Computer Science & Information Technology

With blend steps, higher numbers produce smoother transitions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology