PrepAway - Latest Free Exam Questions & Answers

Which of the following BEST describes this type of attack?

Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username
and password to prevent her email box from being deleted immediately. Which of the following BEST describes
this type of attack?

PrepAway - Latest Free Exam Questions & Answers

A.
Shoulder surfing

B.
Man-in-the-middle

C.
Social engineering

D.
Ransomware

2 Comments on “Which of the following BEST describes this type of attack?

  1. Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

    A social engineer runs what used to be called a “con game.” Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people’s willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.




    2



    0

Leave a Reply