1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
1 year ago
8

your enterprise experienced several technical issues over the last few days. there were multiple instances of passwords needing

to be changed and other issues causing downtime. management has started receiving voicemails regarding fraudulent activities on their accounts. while the voicemails sound authentic, the help desk concludes that they are fake. what type of malicious activity will this be considered?
Computers and Technology
1 answer:
Eva8 [605]1 year ago
8 0

A type of malicious activity which this will be considered as is: vishing.

<h3>What is a password policy?</h3>

A password policy can be defined as a set of rules and standard that are designed and developed by the data security or networking team of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

  • Maximum age of pass.
  • Password minimum length.
  • Password combination.

<h3>What is social engineering?</h3>

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

In Computer technology, some examples of social engineering attacks include the following:

  • Quid pro quo
  • Spear phishing
  • Baiting
  • Tailgating
  • Water-holing
  • Pretexting
  • Phishing
  • Vishing

<h3>What is vishing?</h3>

Vishing is an abbreviation for voice phishing and it can be defined as the use of telephony (telephone communication) to conduct phishing attacks.

In this context, we can reasonably infer and logically conclude that a type of malicious activity which this issue will be considered as is vishing.

Read more on Vishing here: brainly.com/question/14220906

#SPJ1

You might be interested in
Which of the following Power BI tools is best suited for editing data before import?
nikdorinn [45]

Answer:

C.)Power query editor

Explanation:

Power Query Editor is a tool in MS Excel 2010 which allows the user to locate, edit and load external data before importing it.

It imports data from different sources, joins, appends data and shapes data according to requirements.

8 0
3 years ago
Generalized goals are more likely to be achieved than specific goals. True or False
pantera1 [17]
False

They are likely to be achieved because they are well defined, clear, and unambiguous.
6 0
3 years ago
If someone said to you, “Pseudocode is a waste of time! It’s just more work because you end up writing the same program twice,”
myrzilka [38]

Answer:

It allows the designer to focus on main logic without being distracted by programming languages syntax.

* Since it is language independent, it can be translated to any computer language code.

* It allows designer to express logic in plain natural language.

* It is easier to write actual code using pseudocode.

* Unlike algorithms, pseudocodes are concise so pseudocodes are more readable and easier to modify.

Explanation:

8 0
3 years ago
Menu options are usually selected by _____the mouse.
Step2247 [10]

Answer:

clicking

Explanation:

right clicking the mouse

4 0
3 years ago
...................is a high level, structured , open source programming language​
ZanzabumX [31]

Answer:

'BASIC' meaning; Beginners All-purpose Symbolic Instruction Code

3 0
3 years ago
Other questions:
  • Write a Java application that inputs a series of 10 integers and determines and prints the largest and smallest integer. Use a c
    12·1 answer
  • A _____ is an area hosted by a Web server in which project members and colleagues can share documents, models, photos, and other
    7·1 answer
  • The three main types of banks (Large Traditional, Credit Union, Online or Online-Only) have many tradeoffs with respect to techn
    15·2 answers
  • What is the term for a set of actions carried out on inputs?
    7·1 answer
  • A(n)______is a database object used to customiz
    11·1 answer
  • What does "scanf(\"%d\" mean?
    13·2 answers
  • Which code will allow Jean to print Coding rocks! on the screen?
    6·1 answer
  • Write an Email of your Friend Asking Him Help i​
    8·2 answers
  • Draw a flowchart and write the algorithm to find even number between 1 to 50​
    7·1 answer
  • kidede secondary school in Kotido district has been selected to participate in the final continental debating competitions with
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!