题目
COMM_V 335 101 102 2025W1 FINAL EXAM - 2025W1 - Requires Respondus LockDown Browser
单项选择题
Hunter Carr is an accountant with AcctSmart. The firm has a very strict policy of requiring all users to change their passwords every sixty days. In early March, Hunter received an e-mail claiming that there had been an error updating his password and it provided Hunter with a link to a website with instructions for re-updating his password. Something about the e-mail made Hunter suspicious, so he called AcctSmart's information technology department and found that the e-mail was fictitious. The e-mail was an example of
选项
A.social engineering.
B.piggybacking.
C.spamming.
D.phishing.
查看解析
标准答案
Please login to view
思路分析
The scenario describes an email that pretends to be from the company’s IT department and directs the recipient to a website to re-update a password. This is a classic setup used to steal credentials, which characterizes phishing.
Option 1: social engineering. While phishing is a form of social engineering, this answer is too broad here because the ......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
Which of the following is a common Internet scam in which an email is sent from someone posing as your bank or other legitimate business asking for personal information?
Fox Scully received an email promoting a new financial services institution that offers surprisingly low mortgage rates. The email asked customers to provide their address, date of birth, Social Security number, and current mortgage information in order to receive a free loan quote. Suspicious of the offer, Fox researched the company and discovered that the email was fraudulent. This is an example of ________.
Fox Scully received an email promoting a new financial services institution that offers surprisingly low mortgage rates. The email asked customers to provide their address, date of birth, Social Security number, and current mortgage information in order to receive a free loan quote. Suspicious of the offer, Fox researched the company and discovered that the email was fraudulent. This is an example of ________.
eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a digital camera on eBay. Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information. Of course, this email is not actually from eBay and as soon as you log in your information will be stolen. What type of information security breach would you consider this to be?
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!