Pete’s corporation has outsourced help desk services to a large provider. Management has published a
procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing the technician
to work on their PC. Which of the following does this procedure prevent?
Impersonation is where a person, computer, software application or service pretends to be someone or
something it’s not. Impersonation is commonly non-maliciously used in client/server applications. However, it
can also be used as a security threat.
The procedure the users have to go through is to ensure that the technician who will have access to the
computer is a genuine technician and not someone impersonating a technician.