Which of the following BEST describes this type of attack?

Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username
and password to prevent her email box from being deleted immediately. Which of the following BEST describes
this type of attack?

Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username
and password to prevent her email box from being deleted immediately. Which of the following BEST describes
this type of attack?

A.
Shoulder surfing

B.
Man-in-the-middle

C.
Social engineering

D.
Ransomware



Leave a Reply 2

Your email address will not be published. Required fields are marked *


jacob

jacob

the a+ is a very challenging test

Chino Jose Navarro

Chino Jose Navarro

Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

A social engineer runs what used to be called a “con game.” Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people’s willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.