A user receives a phone call from a person claiming to be from tech support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?

a. Malware
b. Phishing
c. Virus
d. Social engineering

Answer: d. Social engineering

Computer Science & Information Technology

You might also like to view...

(Digital Clock) Using features of the Dynamic HTML chapters, implement an application that displays a digital clock in a Web page. You might add options to scale the clock; to display day, month and year; to issue an alarm; to play certain audios at designated times; and the like.

What will be an ideal response?

Computer Science & Information Technology

Drawings are non-text items such as digital photos, scanned images, and pictures. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology