1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
6

What type of social engineering attack uses email to direct you to their their website where they claim you need to update/valid

ate your information and threatens dire consequences if you don't?
Computers and Technology
2 answers:
Rasek [7]3 years ago
5 0
As far as I remember this type of social engineering attack is called fishing. You should be more patient. Check all the links you receive. They can be similar to links to the official websites, but there could be little differences. If you noticed this difference, DON'T follow this link. They will grab your e-mail and your password will be changed automatically.
umka2103 [35]3 years ago
3 0

Phishing is the social engineering attack which uses email to direct you to their their website where they claim you need to update/validate your information and threatens dire consequences if you don't. This type of attack tells you to go to a counterfeit copy of a legitimate web site and enter private or security information. These private information can be later used for identity theft or to access to your financial resources.

You might be interested in
Which xxx completes the code to read every integer from file "data. txt"? fileinputstream inputstream = null; scanner infs = nul
luda_lava [24]

Answer:

total+ infs . nex (xxx){total}

Explanation:

this is correct theres nothing wrong

3 0
2 years ago
Cedric received a disc when he purchased new word processing software. The disc will allow him to install the software. What typ
Goshia [24]
The answer would be A, ROM. CD-ROMs allow for easy software installation from a disk
6 0
3 years ago
If you have a slow computer and add a lot of filters what might hapopen'
Oliga [24]
You might overload the processor and your computer will freeze.  Once frozen if may unfreeze, on may say frozen.  Then you must close the computer, turn it upside down, and unscrew the battery.  Count to one minute, the place the battery back it's place.  After that, you may flip the computer back over, and turn it on by holding down the power button.  Finally, you're all set!
8 0
3 years ago
Read 2 more answers
Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appea
Jobisdone [24]

Answer:

Here you go :)

Explanation:

Change this however you'd like:

array = []

for n in range(10):

   x = int(input("Enter integer: "))

   array.append(x)

dup = set(array)

print(", ".join(str(i) for i in dup))

7 0
3 years ago
How can you determine which package is better: openssh-server-5.3p1-118.1.el6_8.x86_64 or openssh-server-6.6p1-1.el6.x86_64
cupoosta [38]

Answer:

The best by the concept of the newest is the better is the openssh-server-6.6p1-1.el6.x86_64.

Explanation:

The openssh-server-5.3p1-118.1.el6_8.x86_64 and the openssh-server-6.6p1-1.el6.x86_64 are named version of a server which is the openssh- server.

The first server is the later version is the 5.3p1 version( which is seen after the server name ), while the former is the 6.6p1 version. They both use the Linux operating systems version RHEL 6 and 6.8 and are for 32-bit and 64-bit computers (.x86_64).

So, judging by the newest, the version 6.6 is the better server of the two.

8 0
3 years ago
Other questions:
  • The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the s
    10·1 answer
  • Which two statements about using leased lines for your wan infrastructure are true? (?
    14·1 answer
  • Is it bad to leave external hard drive on for hours
    7·1 answer
  • Project using simple formulas
    15·1 answer
  • In your opinion, what is an example of an innovative solution to an engineering problem? Explain briefly why you chose this answ
    9·1 answer
  • Out of a list of the values 8, 3, 30, 5, 15, and 6, what result would the MIN function return?
    9·2 answers
  • What is the command to list the contents of directors in Unix- like operating system
    10·1 answer
  • What internal commands can we use when in interactive mode? can we use CLS and CD?
    6·1 answer
  • Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should h
    12·2 answers
  • The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!