Critical Thinking Questions
?
As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced.?
?Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?

A. ?Social engineering
B. ?Mail bombing
C. ?Spoofing
D. ?Privilege escalation

Answer: A

Computer Science & Information Technology

You might also like to view...

What type of loop checks a Boolean expression at the "bottom" of the loop after each repetition has occurred?

A. do B. for C. switch D. while

Computer Science & Information Technology

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

A. shoulder-surfing B. dumpster diving C. piggybacking D. desk surfing

Computer Science & Information Technology