HOTSPOT
Select the appropriate attack from each drop down list to label the corresponding illustrated
attack Instructions: Attacks may only be used once, and will disappear from drop down list if
selected. When you have completed the simulation, please select the Done button to submit.

Huh??
1. Correct
3. Correct
5. Correct.
However,
2) This scenario is really Lame. How is this a HOAX??
In real life, this is going to be “Phishing”; clearly the fake site wants to collect some kind of information from you.
HELL, in Real Life, EVERY SCENARIO is some form of FISHING.
Everybody is trying to get “something” from you.
/sigh
4) In this scenario… no Deception has taking Place. It’s simply JUNK-MAIL.
Also known as, SPAM.
0
0
Phishing does not only involve getting a user to click on a link to a fake URL but also having the user enter information on the fake website. So I believe that #2 being a Hoax is correct. The user is being tricked to download malware.
0
0