1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
9

Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this

Computers and Technology
1 answer:
ra1l [238]3 years ago
8 0

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

You might be interested in
Which computer applications can Mr. Crowell use to make the classroom learning more stimulating and interesting? Mr. Crowell has
katovenus [111]

Answer:

He can use following computer program to make the class room more interesting and effective:-

  • 1. <u>Reference software</u> : This software help students to access the atlases and dictionaries.Teacher can include this software in research projects .

  • 2. <u>Educational Games</u>: This types of software is very effective for younger children because it motivates them to learn.This software companies have combined gaming and education into one .

  • 3. <u>Graphical software</u> : Student can use this software to create and changes images available on the internet itselfs .
4 0
3 years ago
Read 2 more answers
What is the meaning of Re:?
adelina 88 [10]

Answer:

In Email's Subject Line “Re:” most commonly understood as “Reply/Response” to an Email. “Re: ” is not taken as abbreviation of Regards/Reference. For Reference, Abbreviation is “Ref.”Explanation:

5 0
3 years ago
Read 2 more answers
How do I type over Images (photo posted ​
Ber [7]
Oh a document, I do not believe that you have type on images, but if you were to type a text in a app called PicsArt and saved it and then put it onto the document over the picture it would work.
3 0
3 years ago
Read 2 more answers
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
Egovernment involves the use of strategies and technologies to transform government by improving the delivery of services and en
aleksandrvk [35]
I guess the answer True
3 0
3 years ago
Other questions:
  • Compute the bitwise XOR between 10010100 and 11101010.
    12·1 answer
  • What are two statements that are true about using an external hard drive for backing up data
    14·1 answer
  • NEED HELP(10 POINTS) PLEASE HELP MATH
    8·2 answers
  • Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
    8·1 answer
  • Which of the following technologies is the best choice to convey urgent and highly sensitive information?a. Telephone b. Fax Let
    12·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page?
    9·1 answer
  • Please choose odd one out please tell fast​
    12·1 answer
  • People’s personal information is collected _____. Select 4 options.
    7·2 answers
  • Digital communication and production chapter 17
    6·1 answer
  • Select the correct answer. Which step references adding color, size, and media format in your digital portfolio? A. identifying
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!