In which of the following attacks does an attacker pretend to be a legitimate or authorized person and uses a phone or other communication medium to mislead targets and trick them into revealing information?

A. Dumpster Diving
B. Eavesdropping
C. Impersonation
D. Shoulder Surfing


Answer: C. Impersonation

Computer Science & Information Technology

You might also like to view...

In all structured loops, the ____ must provide either entry to, or exit from, the repeating structure.

A. loop-controlling statement B. loop-directing question C. loop-controlling question D. loop-ending question

Computer Science & Information Technology

Which of the following statements about the Recycle Bin is TRUE?

A) Files sent there are permanently deleted. B) It automatically empties according to the schedule set in Task Manager. C) It is a system tool. D) It is a temporary holding area for files that you think you no longer need.

Computer Science & Information Technology

The Field Size property is not available for Currency fields.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The countermeasure to tiny fragment attacks is to discard packets with an inside source address if the packet arrives on an external interface. 2. A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context. 3. A prime disadvantage of an application-level gateway is the additional processing overhead on each connection 4. The primary role of the personal firewall is to deny unauthorized remote access to the computer. 5. A DMZ is one of the internal firewalls protecting the bulk of the enterprise network.

Computer Science & Information Technology