Which of the following scenarios represents a phishing attempt?

a. An employee at your company has received a malware-infected file in their e-mail.
b. A person posing as an employee tried to access a secured area at your organization.
c. A gift was offered to an employee with access to secured information in exchange for details.
d. An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.


ANSWER: d

Computer Science & Information Technology

You might also like to view...

____________________ trigger events that take place after a user clicks a button.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

“Faced with any sort of technology, ____ people take the time to read instructions.”

a. all b. most c. very few

Computer Science & Information Technology

With the Discretionary Access Control (DAC) model, no object has an owner; the system has total control over that object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Grouping means creating groups of records that share some common characteristic.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology