单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()APhishing scamBSocial engineeringCMan-in-the-MiddleDShoulder surfing

单选题
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
A

Phishing scam

B

Social engineering

C

Man-in-the-Middle

D

Shoulder surfing


参考解析

解析: 暂无解析

相关考题:

单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()AUpdate antivirus definitionsBMAC filteringCEffective security policiesDUser awareness training

单选题A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()AThe switches are not stackableBThe cable was not wired using 568ACThe cable needs to be a crossover cableDThe switches have IGMP snooping enabled

单选题Which of the following is primarily used for VoIP?()ATLSBRDFCNTPDRTP

单选题Which of the following devices is used to connect a WAN to a LAN?()ABasic routerBBasic switchCBridgeDRepeater

单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()ANTPBFTPCRTPDIGMP

单选题An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?()ALayer 1BLayer 4CLayer 5DLayer 7

单选题A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()AThe wrong cable type has been used.B. IDS has shut down the computer's switch port.CThe port on the switch is configured incorrectlyDSpanning tree protocol was implemented.

单选题Which of the following does not affect security on a wireless access point?()AEncryptionBDHCPCPasswordDSSID

单选题A Stateful firewall is MOST useful in protecting against which of the following network scans?()APINGBUDPCXmasDACK

单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()AIS-ISBBGPCOSPFDRIP

单选题Which of the following is used to create multiple networks from one large network?()APATBNATCMulticastDSubnetting