1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
12

You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c

ustomers. The email says your company is overbilling the customer and asks that you examine the attached invoice. You do but find it blank, so you reply politely to the sender asking for more details. You never hear back, but a week later your security team tells you that your credentials have been used to access and exfiltrate large amounts of company financial data. What kind of attack did you fall victim to?A. A fly phishing attackB. A shark attackC. As a phishing attackD. As a whale attack
Computers and Technology
1 answer:
sergejj [24]3 years ago
4 0

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

You might be interested in
You have a computer that runs on a windows 10 operating system and supports modern sleep. what will happen if you close the lid
adell [148]

You have a computer that runs on the Windows 10 operating system and supports modern sleep mode what will happen if you close the computer lid is the computer will be put into sleep mode. If Modern Sleep is supported, the settings for closing the lid will be configured to trigger sleep mode.

A computer system is a basic, complete and functional arrangement of hardware and software with everything needed to implement computing performance. That is the basic working definition of a computer system as we know it, but computer systems have gone through many formal changes over the last few decades.

The physical components of a computer can also be interpreted as hardware. This includes the keyboard, mouse, monitor and processor. Hardware consists of input devices and output devices that make up a complete computer system. Examples of input devices are keyboards, optical scanners, mice and joysticks that are used to enter data into a computer.

You can learn more about computer system here brainly.com/question/14583494

#SPJ4

7 0
1 year ago
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
Which of the following creates a new table called 'game_scores' with 2 columns 'player_name' and 'player_score'?
DerKrebs [107]

Answer:

e

Explanation:

the valid sql syntax for creating table is

CREATE TABLE table_name (

column_name column_type

)

varchar and int are the valid sql types not string and integer

AS is used in select queries to aggregate results under given name

8 0
3 years ago
Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text.
Amiraneli [1.4K]

Answer:

Monitor backlighting

Explanation:

Dylan haven done some troubleshooting on his computer to find out what the problem was but couldn't restore its brightness.

It then means that the Monitor backlighting caused the screen to be very dim.

The Monitor backlighting is bad or faulty.

7 0
3 years ago
Read 2 more answers
A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain t
asambeis [7]

Answer:

personal information management

Explanation:

In other to ensure that required information regarding basic tasks which are required, personal information management helps attain this seamlessly by systematically studying the activities which are being performed in other to or for task such as storing, retrieving, creation. Maintainance and organization of information. With personal information management, tasks are segmented and organized in a tidy and effective manner such that the right, complete and quality information is made available at all times in other to ensure that nothing is missed or lacking.

5 0
2 years ago
Read 2 more answers
Other questions:
  • ASAP HELP NO GUESS A new pet store wants to design a logo to be displayed on business cards, posters in the shop’s windows, and
    9·2 answers
  • A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
    12·1 answer
  • What is a basic operation of computers
    13·1 answer
  • In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
    6·2 answers
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • Within an event-driven program a component from which an event is generated is the ____
    10·1 answer
  • An ____ is an object that produces each element of a container, such as a linked list, one element at a time.
    13·2 answers
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • Which symbol is used for an assignment statement in a flowchart?
    13·1 answer
  • What is the "Driver's Compact Law"?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!