1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
4 years ago
9

Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this

Computers and Technology
1 answer:
ra1l [238]4 years ago
8 0

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

You might be interested in
Juan has performed a search on his inbox and would like to ensure the results only include those items with attachments which co
Mars2501 [29]

Answer:

refine

Explanation:

3 0
3 years ago
Read 2 more answers
An engine you're servicing has electronically controlled cooling fans. Cooling fan 1 doesn't work but cooling fan 2 does. Which
Elanso [62]

It might because of many reasons:

  • Fan 1 is not connected to the Program (via Bluetooth, WIFI, or wired)
  • The code made to make Fan 1 start up has a bug or an error
  • Fan 1 has a hardware problem
  • Fan 1 is out of reach for the electronically controller to reach
  • Fan 1 is not connected to a power supply (tho)

<u><em>sorry if my answers don't help solve your problem </em></u>

4 0
4 years ago
Which command would you use to have a workstation stop using an ip address?
Arada [10]
SSH and Telnet!!!! :)
7 0
3 years ago
Plz answer it’s timed
MAVERICK [17]

Answer: the third one

Explanation:

just trust me, the other ones dont mke sense to what I know about the subject, which is a lot

7 0
3 years ago
What are the advantages of the java.util.Stack implementation of a stack?
klemol [59]

Explanation:

The advantages of java.util.Stack are as following:-

  1. java.util.Stack is an implementation of the vector class hence it can keep track of position of elements in the stack hence it is not required to store an additional pointer for each node.
  2. In the implementation it allocates space only that much is needed.

These are the two advantages of java.util.Stack.

3 0
4 years ago
Other questions:
  • A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
    13·1 answer
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • Parallel tangent and coincident are examples of what
    13·1 answer
  • Which of the following could not be represented by columns in the SPSS data editor? a. Levels of between-group variables. b. Lev
    11·2 answers
  • (01.05 LC)
    7·2 answers
  • QUICK! The commands available from a menu change depending upon what you are doing. True False
    10·2 answers
  • Eric’s computer slows down when he open several computer programs. Why does this happen?
    15·2 answers
  • In this line of code, what does 144 refer to?
    12·1 answer
  • Cú pháp câu lệnh xóa thủ tục
    12·1 answer
  • Explain input device​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!