Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement. The administrators are requesting that everyone send their username and password so that the administrators can compile a list and avoid having everyone change their passwords.
?
What type of attack is this?
A. Spear phishing
B. Impersonation
C. Shoulder surfing
D. Tailgating
Answer: A
You might also like to view...
Explain why executions are always strict even if read locks are released after the last operation of a transaction but before its commitment. Give an improved statement of Rule 2 in Figure 16.16.
What will be an ideal response?
Consider _______ when designing for display on a mobile device.
a. small screen size b. font size c. contrast d. all of the above
How many attempts will the binary search make to find the number 28?
Given a table of data with the three elements shown, assume that you are using a binary search routine. 16 49 28 a. Can't be done b. one attempt c. two attempts d. three attempts e. None of the above
A(n) _________ is an Earth-based device that sends and receives microwave signals. A. microwave station B. microwave hub C. microwave router D. microwave kernel
Fill in the blank(s) with the appropriate word(s).