Many of them attempt to reboot the systems after deleting the specified files and find that the systems are…?

The help desk is flooded with calls from users who receive an e-mail warning about a new virus. The e-mail instructs them to search and delete a number of files from their systems. Many of them attempt to reboot the systems after deleting the specified files and find that the systems are not rebooting properly, which of the following types of attacks has occurred?

The help desk is flooded with calls from users who receive an e-mail warning about a new virus. The e-mail instructs them to search and delete a number of files from their systems. Many of them attempt to reboot the systems after deleting the specified files and find that the systems are not rebooting properly, which of the following types of attacks has occurred?

A.
Hoax

B.
Phishing

C.
Spam

D.
Pharming

Explanation:
Hoax messages may warn of emerging threats that do not exist. These messages instruct users to delete certain files in order to ensure their security against a new virus, while actually only rendering the system more susceptible to later viral agents.

Answer option D is incorrect. Pharming is an attack made by a hacker in which the traffic of a Website is redirected to another bogus Website.

Answer option B is incorrect. Phishing is an attempt to obtain sensitive information by masquerading as a trustworthy entity using an electronic communication, such as e-mail. Answer option C is incorrect. Spam is an unwanted e-mail communication.



Leave a Reply 0

Your email address will not be published. Required fields are marked *