1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
9

Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this

Computers and Technology
1 answer:
ra1l [238]3 years ago
8 0

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

You might be interested in
The Leal button is located in the
Fed [463]
The button is located on the left side of the gear shift right under the main shift button
7 0
2 years ago
Match the components of a blog to their descriptions.
motikmotik

Answer:

Explanation:

1. entry title - name of the posting

2. permalink - place where a blog posting is located

3. entry date - when the posting became available

4. comment - allows users to add to the conversation

3 0
2 years ago
A a a a I don't need help!?
Arlecino [84]

Answer:

ok

Explanation:

ok

6 0
2 years ago
I had about 83 GB before I installed Xcode, I was in the middle of the installation and reconsidered my decision but it's still
Natasha_Volkova [10]

You can try downloading some kind of computer cleaner like CleanMyMac X free version, also definitely restart your computer if you haven't done so already.

4 0
2 years ago
Read 2 more answers
Drag the tiles to the correct boxes to complete the pairs.
jek_recluse [69]

Answer:

1. Multistage database.

2. Stationary database.

3. Virtual database.

4. Distributed database.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

There are four (4) major types of database in a data warehouse and these are;

1. <u>Multistage database</u>: used for concise as well as detailed historical data. It provides summarized data which can be used by an employee for short-term decision making.

2. <u>Stationary database</u>: used where access to data is rare i.e business firms who do not access data frequently. In order to use this database, the users must have an access to metadata store and thus, directly having access to the data on a source system.

3. <u>Virtual database</u>: used for accessing data in diverse applications using middleware. This type of database is dependent on having access to information on various databases.

4. <u>Distributed database</u>: used by an organization that runs several businesses. Therefore, this type of database are usually located or situated in various geographical regions.

5 0
2 years ago
Other questions:
  • How can we set the color of a text that acts as a link in a web page​
    10·2 answers
  • Paulene is using this table in Word,and she started with the cursor in the box that read “Flavor”. she then hits Alt+End,The the
    7·1 answer
  • HELP ME PLZ QUICK Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took
    6·1 answer
  • Which types of computers are used by large businesses
    10·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • Pig Latin is ______ and fits very naturally in the pipeline paradigm while SQL is instead declarative.
    7·1 answer
  • What term is used to refer to the requesting of information from a database?
    10·2 answers
  • Select the correct answer from each drop-down menu
    7·1 answer
  • A group of users in a small publishing office want to share large image files in a common folder with high availability. Which o
    15·1 answer
  • Can u please help me solve this
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!