A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection

Answer: C. Social engineering

Computer Science & Information Technology

You might also like to view...

Access differs from other Microsoft software because it:

A) does not allow more than one user to work on a file at a time. B) works primarily from memory. C) does not save your work as soon as changes are made. D) works primarily from storage.

Computer Science & Information Technology

The ____ behavior is used to change the font, position, borders and shading, and visibility of an object.

A. Call Script B. Change Property/Restore C. Play Sound D. Set Text

Computer Science & Information Technology