1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
6

Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following

types of attacks is this?A. PhishingB. SpoofingC. RansomwareD. E-mail poisoning
Computers and Technology
1 answer:
uysha [10]3 years ago
0 0

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
You might be interested in
A site, a domain, or an organizational unit in active directory is referred to as a:____.
grandymaker [24]

A site, a domain, or an organizational unit in an active directory is referred to as a <u>container.</u>

<h3>What is a domain?</h3>

A domain is a name of a site of a name that is given online to a website. This name is the identity of the website. This gives the detail of your site, and your site will be identified by this name.

An active directory is a function developed by Microsoft. It maintains the network of a windows domain. This contains the site, domain, and together called a container.

Thus, a container in an active directory is a site, a domain, or an organizational unit.

To learn more about the domain, refer to the link:

brainly.com/question/17562152

#SPJ4

8 0
1 year ago
Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet c
VashaNatasha [74]

Answer:

Option (d) is correct

Explanation:

Previously saved capture files can be read using Wireshark. For this, select the File then open the menu. Then Wireshark will pop up the “File Open” dialog box.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a .pcapng extension, which stands for packet capture, next generation.

5 0
2 years ago
A program that performs handy tasks, such as computer management functions or diagnostics is often called a/an ____________.
Elodia [21]

Answer:

DOS

Explanation:

Disk operating

4 0
2 years ago
Who is the father of modern computer?​
nydimaria [60]

Answer:

I would say Alan Turing is the father of the modern computer

7 0
3 years ago
Read 2 more answers
What is meant by algorithm?​
ExtremeBDS [4]

Answer:

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Explanation:

7 0
3 years ago
Other questions:
  • When a dynamic array with a class for a base type is declared, which constructor is called?
    5·1 answer
  • The method of loci, peg-word system, substitute word system, and method of word association are all examples of _____.
    8·1 answer
  • Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Whic
    13·2 answers
  • The term "Cloud" refers to what option(s) below? (Select all that apply)
    13·1 answer
  • What is an audit trail?
    7·2 answers
  • The minimum spanning tree of an undirected graph G exists if and only if G is connected. True or False?
    12·1 answer
  • Where is the "delete account" button in my profile? And please give me a legit answer and not just a word.
    10·2 answers
  • Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
    11·1 answer
  • Suppose you want to boot a VM from its virtual DVD drive, but it boots to the VM’s hard drive. Which of the following could be t
    12·1 answer
  • I need the answers. i don’t get this
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!