which of the following security threats?

A user receives a phone call from a person claiming to be from technical support. This
person knows the user’s name and that the user has Windows installed on their computer.
The technician directs the user to open Event Viewer and look at some event log entries to
demonstrate the effects of a virus on the computer. The technician also asks the user for
their user ID and password so that they can clean the computer. This is an example of which
of the following security threats?

A user receives a phone call from a person claiming to be from technical support. This
person knows the user’s name and that the user has Windows installed on their computer.
The technician directs the user to open Event Viewer and look at some event log entries to
demonstrate the effects of a virus on the computer. The technician also asks the user for
their user ID and password so that they can clean the computer. This is an example of which
of the following security threats?

A.
Social engineering

B.
Phishing

C.
Malware

D.
Virus

Explanation:

Reference:
http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html



Leave a Reply 3

Your email address will not be published. Required fields are marked *


hmm

hmm

there are a lot of these social engineering questions and they are so easy. the 802 canNOT have so many questions that are this easy…

Jamaul

Jamaul

Wont be easy when you got Jamaul behind yo white ass

come on jamaul

come on jamaul

come on jamaul