Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?

A. Vishing
B. Spear phishing
C. Phishing
D. Pharming


Ans: A. Vishing

Computer Science & Information Technology

You might also like to view...

Critical Thinking QuestionsCase 4-2Your email volume has begun to overwhelm you since you assumed new responsibilities at your job. You need to start flagging your emails, in order to give them a prioritization that you can use to manage your workflow more efficiently.An email just arrived from your supervisor and it must be addressed before you leave work today. What priority level should you assign the email? a. Deferredc. Normalb. Highd. In Progress

What will be an ideal response?

Computer Science & Information Technology

A diagram of the hierarchical organization of the subproblems of a solution is called ______.

a. stepwise refinement b. divide and conquer c. a top-down approach d. function calls e. a structure chart

Computer Science & Information Technology

________ are lines used to connect the label to the slice of pie

Fill in the blank(s) with correct word

Computer Science & Information Technology

Guides can be horizontal, vertical, or diagonal.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology