A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
- social engineering
- anonymous keylogging
Explanation: Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software based security threats, not social engineering.
More Questions: Modules 3 – 5: Network Security Exam Answers
More Questions: IT Essentials (ITE v7) Chapter 10 Exam Answers
More Questions: IT Essentials (ITE v7) Chapter 13 Exam Answers
More Questions: Modules 13 – 17: Threats and Attacks Group Exam