A secretary receives a phone call from someone claiming that their manager is about to give an important presentation but the presentation files are corrupted.
The caller sternly asks that the secretary email the presentation right away to a personal email address. The caller also states that the secretary is being held personally responsible for the success of this presentation.
What type of social engineering tactic is the caller using?
- trusted partners
Explanation: Intimidation is a tactic that cybercriminals will often use to bully a victim into taking an action that compromises security.
Exam with this question: Network Technician Career Path Exam Answers
Exam with this question: Network Support and Security Final Exam
Exam with this question: 1.6.2 Cybersecurity Threats, Vulnerabilities, and Attacks Quiz
Exam with this question: Endpoint Security: My Knowledge Check Answers