COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this?
A
Insider Threat
B
Phishing
C
Social Engineering
D
Whaling
Explanation: 

Detailed explanation-1: -Phishing attacks are a subset of social engineering strategy that imitate a trusted source and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data.

Detailed explanation-2: -If someone posing as an IT tech requests information about your computer configuration, this kind of attack is: social engineering. Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or perform actions that compromises their security.

Detailed explanation-3: -Types of Social Engineering Attacks. For the purposes of this article, let’s focus on the six most common attack types that social engineers use to target their victims. These are phishing, pretexting, baiting, quid pro quo, tailgating and CEO fraud.

Detailed explanation-4: -Baiting. As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. Pretexting. Phishing. Spear phishing.

Detailed explanation-5: -DoS and DDoS Attacks. A denial-of-service (DoS) attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests. Phishing Attacks. Ransomware. SQL Injection Attack. Brute force attack.

There is 1 question to complete.