Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement. The administrators are requesting that everyone send their username and password so that the administrators can compile a list and avoid having everyone change their passwords.
?
What type of attack is this?

A. Spear phishing
B. Impersonation
C. Shoulder surfing
D. Tailgating


Answer: A

Computer Science & Information Technology

You might also like to view...

Explain why executions are always strict even if read locks are released after the last operation of a transaction but before its commitment. Give an improved statement of Rule 2 in Figure 16.16.

What will be an ideal response?

Computer Science & Information Technology

Consider _______ when designing for display on a mobile device.

a. small screen size b. font size c. contrast d. all of the above

Computer Science & Information Technology

How many attempts will the binary search make to find the number 28?

Given a table of data with the three elements shown, assume that you are using a binary search routine. 16 49 28 a. Can't be done b. one attempt c. two attempts d. three attempts e. None of the above

Computer Science & Information Technology

A(n) _________ is an Earth-based device that sends and receives microwave signals. A. microwave station B. microwave hub C. microwave router D. microwave kernel

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology