FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this?
A
Insider Threat
B
Phishing
C
Social Engineering
D
Whaling
Explanation: 

Detailed explanation-1: -If someone posing as an IT tech requests information about your computer configuration, this kind of attack is: social engineering. Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or perform actions that compromises their security.

Detailed explanation-2: -Phishing. The most common form of social engineering attack is phishing. Phishing attacks exploit human error to harvest credentials or spread malware, usually via infected email attachments or links to malicious websites.

There is 1 question to complete.