Which of following actions should recommend the user to take?

You are working as a technician at Domain.com. You receive a call from a suspicious user that has received an email stating that the company’s network administrators are attempting to validate the complexity of login passwords by requesting that users provide the password in a reply email. Which of following actions should recommend the user to take?

You are working as a technician at Domain.com. You receive a call from a suspicious user that has received an email stating that the company’s network administrators are attempting to validate the complexity of login passwords by requesting that users provide the password in a reply email. Which of following actions should recommend the user to take?

A.
Send a reply message with an encrypted signature attached.

B.
Send a reply message containing the password.

C.
Deny the request by deleting the email.

D.
Encrypt the reply and send the reply to the requestor.

Explanation:
This is one of the numerous variants of a social engineering attack where someone asks to get your logon name and password by pretending to be someone who you normally would trust.



Leave a Reply 0

Your email address will not be published. Required fields are marked *