which of the following attacks may he become vulnerable to?

John works as an Office Assistant in DataSoft Inc. He has received an e-mail from
[email protected] with the following message:
The DueSoft Lottery Incorporation
This is to inform you that you have just won a prize of $7,500.00 for this year’s Annual Lottery
promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect
active online e-mails and select five people every year as our winners through an electronic
balloting machine. Please reply within three days of receiving this e-mail with your full details like
Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your
prize.
If John replies to this e-mail, which of the following attacks may he become vulnerable to?

John works as an Office Assistant in DataSoft Inc. He has received an e-mail from
[email protected] with the following message:
The DueSoft Lottery Incorporation
This is to inform you that you have just won a prize of $7,500.00 for this year’s Annual Lottery
promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect
active online e-mails and select five people every year as our winners through an electronic
balloting machine. Please reply within three days of receiving this e-mail with your full details like
Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your
prize.
If John replies to this e-mail, which of the following attacks may he become vulnerable to?

A.
Salami attack

B.
Man-in-the-Middle attack

C.
Phishing attack

D.
DoS attack

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *