NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Phishing
|
|
Disguising yourself as an employee to gain access to computer systems
|
|
Sending an email with a virus you created attached to it
|
|
Using brute force to access a system
|
|
Calling someone pretending to be IT support to steal confidential data
|
Detailed explanation-1: -Baiting. An attacker leaves a malware-infected physical device, such as a Universal Serial Bus flash drive, in a place it is sure to be found. Phishing. Spear phishing. Vishing. Whaling. Pretexting. Scareware. Watering hole. More items
Detailed explanation-2: -Phishing. The most common form of social engineering attack is phishing. Phishing attacks exploit human error to harvest credentials or spread malware, usually via infected email attachments or links to malicious websites.
Detailed explanation-3: -It then prods them into revealing sensitive information, clicking on links to malicious websites, or opening attachments that contain malware. An example is an email sent to users of an online service that alerts them of a policy violation requiring immediate action on their part, such as a required password change.
Detailed explanation-4: -Social Engineering: Social Engineering is type of attack in which someone with very good interactive skills manipulates others into revealing information about network that can be used to steal data.