1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
3 years ago
12

Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I

really need correct answer ASAP
What kinds of people do you think are susceptible to being duped by "phishing" attacks?
Computers and Technology
1 answer:
timurjin [86]3 years ago
6 0

Answer:

Find answers below.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.

Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.

In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

You might be interested in
How long does a bankruptcy affect your financial reputation
Diano4ka-milaya [45]
It effects it until it is refilled to its normal amount
3 0
3 years ago
_______ data would be useful for creating a weekly status report for your manager that should reflect changes in real time.     
elena55 [62]
D. Field data because that it a report of what happened over the week that a manager can reflect on for possible changes.
3 0
3 years ago
Read 2 more answers
Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these t
NemiM [27]

Answer:

w3schools

Explanation:

there is a webiste called w3schools that really helped me through my web page design class, just click on learn html

4 0
3 years ago
To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the t
nevsk [136]

Answer:

Jumbo frames

Explanation:

Ethernet frames having a payload size above 1500 bytes are called Jumbo frames. The maximum MTU value set by the IEEE 802.3 is 1500 bytes, but jumbo frames have sizes up to a maximum of 9000 bytes, hence they do not meet the standards of IEEE 802.3. They are used in local area networks that can transmit data at high rates of 1 gigabits per second.

6 0
3 years ago
________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
ra1l [238]
Im pretty sure its WEP :)
7 0
4 years ago
Other questions:
  • Consider the concept of cultural lag. Identify two American values that are “lagging.” What are three norms that are lagging? Ho
    11·1 answer
  • Which of the following is an accurate statement? When the LOWER function is used in a SELECT clause, it will automatically store
    6·1 answer
  • Which of the following is a true statement?
    12·2 answers
  • _____ creates a border or space that separates information.
    14·1 answer
  • Dimensional arrays can be created using loops. 2 dimensional arrays can be created using:
    10·1 answer
  • Write a program that takes a decimal number from the user and then prints the integer part and the decimal part separately. For
    13·1 answer
  • TRUE AND FALSE
    10·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • Explain briefly the use of the computers in the advertising area​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!