1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
3 years ago
12

A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the

user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?
Computers and Technology
1 answer:
klasskru [66]3 years ago
7 0

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

You might be interested in
Why should you be chosen over someone else? *
Lera25 [3.4K]

Answer:

free points

Explanation:

6 0
3 years ago
Read 2 more answers
Libreoffice is an example of which type of software?.
max2010maxim [7]

LibreOffice is an Open Source Software.

<h3>Open Source Software (OSS)</h3>

A software is classified as <u>Open Source</u> when your code can be use, modified and distribute with its original rights.

<h3>LibreOffice</h3>

For answering this question, you should know a software LibreOffice.

LibreOffice is a software that allows to create: sheets, documents, drawing, charting, database, presentations, etc. It's free and an open source software - main advantages when compared to other software available.

In the other words, LibreOffice is free because the user does not need to pay any license. Also, it is an open source software because your code can manipulate for any developer.

Read more about Open Source Software here:

brainly.com/question/4593389

3 0
3 years ago
You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concern
dmitriy555 [2]

Answer:

True

Explanation:

Device Manager -

In the microsoft Windows operating system , it is the control panel applet .

It helps to control and view any of the hardware , which is attached external onto the computer or laptop .

The various hardware attached can be easily sorted in a convenient manner .

In case the hard work is not working , the information gets highlighted and in case the hard work is working properly , the data would be displayed to the screen .

Hence , from the given scenario of the question ,

The correct term is device manager .

4 0
4 years ago
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
What is the name of the popular DBMS (database management system) that is open source and is distributed under the General Publi
Alex_Xolod [135]

Answer:

I looked it up on google and it said that one of the most popular ones is MySQL.

Explanation:

I don't know if it's right. I just looked it up on google.

6 0
3 years ago
Other questions:
  • Google wallet software utilizes android phones with near field communication technology, such as _____, to allow shoppers to swi
    12·1 answer
  • The use of computer and special software packages to create and edit documents
    11·1 answer
  • Which level of education do most peoplebecoming a broadcast analyst obtain?
    13·2 answers
  • This diagram shows who is responsible in preventing cyberbullying. A flowchart. Top box is labeled Cyberbullying can be prevente
    14·2 answers
  • What does the action tool allow you to do in Microsoft Powerpoint?
    15·1 answer
  • hen a computer user stored data in computer memory, it required 1,024 bytes. How many KB does this represent?
    8·1 answer
  • You can access word's typographic characters with the _______ button on the insert tab
    9·1 answer
  • What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page?
    14·1 answer
  • How to do a linear equations
    8·1 answer
  • What feature do you need on a computer if you want to take it on vacation to another continent?A. Dual-voltage selector switch B
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!