A security administrator notices large amounts of traffic within the network heading out to an external website. The website seems to be a fake bank site with a phone number that when called, asks for sensitive information. After further investigation, the security administrator notices that a fake link was sent to several users. This is an example of which of the following attacks?
A. Vishing
B. Phishing
C. Whaling
D. SPAM
E. SPIM
Answer: B. Phishing
You might also like to view...
A named range can begin with the / symbol
Indicate whether the statement is true or false
What term is used to describe an electrical entity that hinders the flow of current and is often a result of a mismatch between two devices?
A. fade margin B. sensitivity C. negative gain D. impedance
A source file is a file containing links to receive data from the destination files.
Answer the following statement true (T) or false (F)
A security analyst is inspecting the results of a recent internal vulnerability scan that was performed against intranet services.The scan reports include the following critical-rated vulnerability: Title: Remote Command Execution vulnerability in web server Rating: Critical (CVSS 10.0)Threat actor: any remote user of the web serverConfidence: certain -Recommendation: apply vendor patchesWhich of the following actions should the security analyst perform FIRST?
A. Escalate the issue to senior management. B. Apply organizational context to the risk rating. C. Organize for urgent out-of-cycle patching. D. Exploit the server to check whether it is a false positive.