A security administrator notices large amounts of traffic within the network heading out to an external website. The website seems to be a fake bank site with a phone number that when called, asks for sensitive information. After further investigation, the security administrator notices that a fake link was sent to several users. This is an example of which of the following attacks?

A. Vishing
B. Phishing
C. Whaling
D. SPAM
E. SPIM


Answer: B. Phishing

Computer Science & Information Technology

You might also like to view...

A named range can begin with the / symbol

Indicate whether the statement is true or false

Computer Science & Information Technology

What term is used to describe an electrical entity that hinders the flow of current and is often a result of a mismatch between two devices?

A. fade margin B. sensitivity C. negative gain D. impedance

Computer Science & Information Technology

A source file is a file containing links to receive data from the destination files.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A security analyst is inspecting the results of a recent internal vulnerability scan that was performed against intranet services.The scan reports include the following critical-rated vulnerability: Title: Remote Command Execution vulnerability in web server Rating: Critical (CVSS 10.0)Threat actor: any remote user of the web serverConfidence: certain -Recommendation: apply vendor patchesWhich of the following actions should the security analyst perform FIRST?

A. Escalate the issue to senior management. B. Apply organizational context to the risk rating. C. Organize for urgent out-of-cycle patching. D. Exploit the server to check whether it is a false positive.

Computer Science & Information Technology