Which of the following scenarios represents a phishing attempt?
a. An employee at your company has received a malware-infected file in their e-mail.
b. A person posing as an employee tried to access a secured area at your organization.
c. A gift was offered to an employee with access to secured information in exchange for details.
d. An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
ANSWER: d
You might also like to view...
____________________ trigger events that take place after a user clicks a button.
Fill in the blank(s) with the appropriate word(s).
“Faced with any sort of technology, ____ people take the time to read instructions.”
a. all b. most c. very few
With the Discretionary Access Control (DAC) model, no object has an owner; the system has total control over that object.
Answer the following statement true (T) or false (F)
Grouping means creating groups of records that share some common characteristic.
Answer the following statement true (T) or false (F)