1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
4 years ago
9

Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this

Computers and Technology
1 answer:
ra1l [238]4 years ago
8 0

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

You might be interested in
list the sixth external parts of a computer system and identify which are output and which are input devices
Marianna [84]
<em>Keyboard -----> Input device</em>
<em>Printer  --------> Output device</em>
<em>mouse ---------> Input device</em>
<em>Monitor --------> Output device</em>
<em>CD roam ------> Input device</em>
<em>Projector ------> Output device</em>
4 0
3 years ago
Read 2 more answers
Place the steps in order for creating a Custom Search Folder in Outlook 2016.
TEA [102]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct order for creating Custom Search Folder in Outlook 2016 is given below:

  1. Click the Folder tab
  2. Click the New Search  Folder
  3. Open the Custom Search
  4. Choose your criteria and  
  5. Select folder in pane to
  6. Click ok to execute the search.

5 0
3 years ago
Read 2 more answers
Suppose a program contains 500 million instructions to execute on a processor running on 2.2 GHz. Half of the instructions takes
Anit [1.1K]

Answer:

1.48 s

Explanation:

Number of instructions = 500 million = 500 * 10⁶

clock rate = 1 / 2.2 GHz = 1 / (2.2 * 10⁹ Hz) = 0.4545 * 10⁻⁹ s

We need to compute the clocks per instruction (CPI)

The CPI = summation of (value * frequency)

CPI = (50% * 3 clock cycles) + (50% * 10 clock cycles)

CPI = (0.5 * 3) + (0.5 * 10) = 1.5 + 5 = 6.5

Execution time = number of instructions * CPI * clock rate

Execution time = 500 * 10⁶ * 6.5 * 0.4545 * 10⁻⁹ =1.48 s

5 0
3 years ago
______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide dec
Alex777 [14]

Answer: Data analytics

Explanation:

3 0
3 years ago
Which is the 6-by6 rule for presentations
marin [14]

Answer:

You might already be familiar with the 6×6 rule. This presentation rule suggests that you should include no more than six words per line and no more than six bullet points per slide. The goal is to keep your slide from being so dense and packed with information that people don't want to look at it

7 0
4 years ago
Other questions:
  • Dialogue is not a characteristic of functional text because
    9·1 answer
  • 1. How do channels differ from layers?
    11·1 answer
  • Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
    5·1 answer
  • In Java please.
    13·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • Consider the following process for generating binaries. A compiler is used to generate the object code for individual modules, a
    8·1 answer
  • अस्स्मन्चचरे ------------------- दृश्यते |
    8·1 answer
  • a. Create an Abstract class called Vehicle with abstract methods accelerate, stop, and gas, &amp; data of your choice (5 marks)
    12·1 answer
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • Not all hardware is connected with wires, some hardware might be connected wirelessly with
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!