A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
ered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device? A. A vulnerability in the device's software is exploited to gain unauthorized access to other devices on the user's home network.
B. A vulnerability in the device's software is exploited to install software that reveals the user's password to an unauthorized individual
C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.
D. The user's account is sent an overwhelming number of messages in an attempt to disrupt service on the user's home network.
C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm account password by clicking on a link in the e-mail and entering password on the resulting page.
Explanation:
Phishing attack is a cyber atttack in which user is sent an email which he thinks is useful. When the user open the email and does as instructed in the email his account gets locked. His personal information is haccked and then rannsom is demanded to release that information. The hacckers usually steal credit card information and bank details of the user which are misused.
This option restores the phone to default thereby eliminating possible files that might have been responsible for the way the phone has been responding for days.