Sara, a security administrator, sends an email to the user to verify their password has been reset. Which of the following threats is BEST mitigated by this action?

A. Spear phishing
B. Impersonation
C. Hoaxes
D. Evil twin


Answer: B. Impersonation

Computer Science & Information Technology

You might also like to view...

Which of the following is poor design?

a. A data field is derived from other data fields in the same class. b. A method must be invoked after/before invoking another method in the same class. c. A method is an instance method, but it does not reference any instance data fields or invoke instance methods. d. A parameter is passed from a constructor to initialize a static data field.

Computer Science & Information Technology

Name the three places in a C++ program where variables can be declared.

What will be an ideal response?

Computer Science & Information Technology

The ____ color is the color of the original pixel in an image.

A. bottom B. base C. strong D. first

Computer Science & Information Technology

To duplicate a table or create a new table based on an existing table, select the ________ Save As option

A) Save Database As B) Save Object As C) Save Table As D) Save As Backup

Computer Science & Information Technology