HOTSPOT
Select the appropriate attack from each drop down list to label the corresponding illustrated attack
Instructions: Attacks may only be used once, and will disappear from drop down list if selected.
When you have completed the simulation, please select the Done button to submit.
Answer: <a href=”//static.equizzing.com/wp-content/uploads/sy0-301-v3/24.jpg”><img class=”aligncenter size-full” src=”//static.equizzing.com/wp-content/uploads/sy0-301-v3/24.jpg” alt=”” /></a>
Explanation:
Something is off on this question. The mass mailing is right out of the book of SPAM. Don’t see how it fits phishing. And wouldn’t fake AV software be a trojan? I think the given answer choices are inaccurate.
When you go after CEO’s and board members you are going after the “big fish”, this is an instance of whaling. You had it as a solution on an earlier chart.
Spear-phishing is AKA Whaling, not sure what spear-pushing is.