1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
3 years ago
5

If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying soc

ial engineering techniques
Computers and Technology
1 answer:
katrin2010 [14]3 years ago
7 0

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

You might be interested in
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
3 years ago
Read 2 more answers
Air bags are always safe. A. True B. False
Naya [18.7K]

Air bags are always safe. A. True<u> B. False</u>

5 0
3 years ago
Read 2 more answers
You are considering creating a mobile app. Describe a basic statement for the app you would create and whether your app should b
kondor19780726 [428]

if the game has either good graphics,good story, or good overall if should be paid to get

4 0
3 years ago
what company is credited with solving a problem by creating a program that would work on all computers
seropon [69]

Answer:

The General Problem Solver (GPS) is a particular computer program created in 1957 by Herbert Simon, J. C. Shaw, and Allen Newell intended to work as a universal problem solver, that theoretically can be used to solve every possible problem that can be formalized in a symbolic system, given the right input configuration

Explanation:

7 0
3 years ago
List three different computer languages, and describe how each one is used in software development
Bumek [7]
JavaScript- Used in designing websites

Python- Used in developing desktop and web applications

C++ Used in Video games, operating systems such as Windows 10, and device drivers.
6 0
3 years ago
Other questions:
  • While a computer is running the operating system remains in memory. true or false?
    7·1 answer
  • What types of storage can be used to access your data on another computer?
    7·1 answer
  • If a friend changes the password on your phone how do you get into it if you dont know the password
    12·1 answer
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • Gina is driving her car down the street. She has a teddy bear sitting on the back seat. A dog runs in front of Gina's car, so sh
    15·2 answers
  • A web designer is creating a web site and wants each browser to resize the text size to look the same in each device. what measu
    6·1 answer
  • Science can give us
    5·2 answers
  • The simplest element that exists is only one proton and one electron. It is what stars are made of. It's symbol is "H". What is
    9·1 answer
  • Which part of project management involves determining possible risks?
    15·2 answers
  • How do you put text in MS publisher?<br><br> When do you use text wrapping?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!