1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
12

You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c

ustomers. The email says your company is overbilling the customer and asks that you examine the attached invoice. You do but find it blank, so you reply politely to the sender asking for more details. You never hear back, but a week later your security team tells you that your credentials have been used to access and exfiltrate large amounts of company financial data. What kind of attack did you fall victim to?A. A fly phishing attackB. A shark attackC. As a phishing attackD. As a whale attack
Computers and Technology
1 answer:
sergejj [24]3 years ago
4 0

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

You might be interested in
A DTP setup includes many hardware and software components.
QveST [7]

Answer:

Apple Laser Writer is an example of a DTP <u>Hardware.</u>

Explanation:

DTP means Desktop Publishing. It may include the hardware and software. The DTP hardware includes two major parts a computer and a printer. The DTP software includes the software such as Photoshop, illustrator an other software that needs in desktop publishing.

Apple laser writer is a printer that is used to print the text and diagrams that we make using DTP software tools.

7 0
3 years ago
Which criterion can be used to select the appropriate type of network media for a network?
OverLord2011 [107]

There are various kinds of network media and each one of them has different features and benefits. Some have different characteristics and not all of them are meant to perform the same purpose. While choosing network media, a number of criteria must be met. These criteria include:

The distance the selected medium can successfully carry a signal.

The environment where the selected medium is to be installed

Explanation:

The distance the selected medium can successfully carry a signal – The type of network media you choose depends on the distance it can cover before you install signal boosters or repeaters. Repeaters are used to regenerate signals that are required to cover greater distances. A UTP cable as compared to fiber is more prone to interference like noise and the distance it covers before a signal repeater is installed is shorter. Fiber cable is considered the best for distances as it can cover longer distances.

Environment should also be considered when choosing network media - If your network is setup in a place where there is too much electromagnetic field being generated, then you may be required to purchase fiber optic cables. Fiber optics are immune to such interference.

Learn about network media

brainly.com/question/9279069

#LearnWithBrainly

3 0
3 years ago
A plan to budget time for studying and activities is referred to as a study routine. study habits. study skills. a study schedul
vesna_86 [32]

Answer:

A study routine

Explanation:

6 0
3 years ago
Read 2 more answers
True or False. A modern programming EXE provides a text editor, a file manager, a compiler, a linker and loader, and tools for d
Flauer [41]

Answer:

True

Explanation:

Mordern programming environments provide essential tools needed to build, test, debug, etc. examples are VSCode, Atom, Sublime text, etc.

7 0
3 years ago
A _____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent
LUCKY_DIMON [66]
I think its a virus or a trojan horse
8 0
3 years ago
Other questions:
  • The U.S. continues to become more dependent on the global domain within the information environment consisting of the interdepen
    8·1 answer
  • Advantages of a personal area network
    5·1 answer
  • Which type of operation writes the file system structure to the disk?
    5·1 answer
  • What server role provides IEEE 802.1X authentication features? (Points : 5) File services
    10·1 answer
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • Find the number of ways in which a committee of 4 can be chosen from six boys and
    8·1 answer
  • What does c++ programming mean?
    7·1 answer
  • What is a gamer?
    10·1 answer
  • Discussion Topic
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!