1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
12

You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c

ustomers. The email says your company is overbilling the customer and asks that you examine the attached invoice. You do but find it blank, so you reply politely to the sender asking for more details. You never hear back, but a week later your security team tells you that your credentials have been used to access and exfiltrate large amounts of company financial data. What kind of attack did you fall victim to?A. A fly phishing attackB. A shark attackC. As a phishing attackD. As a whale attack
Computers and Technology
1 answer:
sergejj [24]3 years ago
4 0

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

You might be interested in
With the help of technology students will benefit greatly from studying by themselves at home. Do you agree or disagree with the
cestrela7 [59]
I disagree because when kids are home alone, and you think they are studying they might not be and they will be playing games on the computer.
6 0
3 years ago
Read 2 more answers
The engine type that is fired by gas or oil
salantis [7]
Internal combustion is the answer
8 0
3 years ago
Read 2 more answers
What does cramming to hand in an assignment
Vikki [24]
Honestly gotta say cramming in an assignment doesnt help at all

5 0
3 years ago
You are the network administrator for Corpnet.com. You install the Windows Server Backup Feature on a Windows Server 2012 R2 fil
Vsevolod [243]

To ensure that multiple backups of the server are available for restores you should Modify the frequency of the scheduled backup.

a. Modify the frequency of the scheduled backup.

<u>Explanation:</u>

To backup system normal and good practices schedule every day either different folder, which is further classified day of a week name. For example Sunday, Monday, Tuesday Wednesday, Thursday, Friday Saturday backup schedule will once a week.

Suppose Monday backup schedule run once a week at midnight of every Monday, same away Tuesday backup schedule run once a week at midnight of every Tuesday. If we schedule weekly one day folder end user will have 6 last days folder so that end user can restore the data any point of time.

7 0
3 years ago
a 83. is a transition method that encapsulates ipv6 traffic inside ipv4 packets. a. tunneling c. natting b. scheduling d. dual s
finlep [7]

Tunneling  is a transition method that encapsulates ipv6 traffic inside ipv4 packets.

<h3>What is Tunneling?</h3>

Tunneling is known to be a term that connote a kind of a protocol that gives room for the secure transmission of data from a single network to another.

Note that the act of Tunneling involves giving room also to private network transmission to be sent across a given public network, such as the Internet, via a process known to be encapsulation.

Hence, based on the above, Tunneling  is a transition method that encapsulates ipv6 traffic inside ipv4 packets.

Learn more about Tunneling   from

brainly.com/question/18994946

#SPJ4

8 0
1 year ago
Other questions:
  • How is informatics affecting banking and financial institutions?
    13·1 answer
  • Instead of starting with a blank PowerPoint presentation, you can use a __________.
    14·2 answers
  • Shapes in the Shapes gallery can be combined to show relationships among the elements.
    7·1 answer
  • The word __________ refers to the numbers, words, or more generally, any collection of symbols that is manipulated by a program.
    7·1 answer
  • Once the CPU has fetched the data requested, what are the next steps in the process?
    15·1 answer
  • Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between li
    8·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • Help! Picture provided
    7·2 answers
  • Which of the following statements should be avoided when developing a mission statement?
    13·1 answer
  • How did the ENIAC change computing?<br> how did the eniac change computing
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!