1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
7

Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and

password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario
Computers and Technology
1 answer:
makkiz [27]3 years ago
7 0

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

You might be interested in
a ____ is a horizontal or vertical bar that appears when the contents of an area may not be visible completely on the screen.
pav-90 [236]
The answer is a Scroll bar, the description fits perfectly because you need to move it to see more of the content you are viewing, and it wont be completely. when the item does appear completely on screen then the bar is relatively large and there is  no need for scrolling, however the opposite occurs during when you cannot see all of it.
5 0
3 years ago
The force that pulls away from a curve is known as
77julia77 [94]

The correct answer is centrifugal force.

The force that pulls out from the center on a body that is in a circular motion is called centrifugal force. This force increases as the speed of motion increases. It is centrifugal force that results in a strong outward pull on your vehicle traveling around a corner.

7 0
3 years ago
Please please help I don’t understand this
garik1379 [7]

Answer:

It is this because yass

Explanation:

And yes

6 0
2 years ago
Read 2 more answers
13 POINTS! Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to
Ksju [112]

A. digital encryption

5 0
3 years ago
Read 2 more answers
What type of virus was the "lloveyou" virus?<br> 1.Trojan<br> 2.Worm
Paul [167]

Answer:

2. Worm

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Jerry suspects that information about his internet usage was sent to external websites without his knowledge. He is wary about t
    7·1 answer
  • What are the basic tools for coding HTML manually?
    10·2 answers
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • List three tacos there are several from the opening page of the help and support center.
    5·1 answer
  • Which route of entry could chemicals use to enter through the body’s airways?
    8·1 answer
  • When entering a expressway using a weave lane you must do what
    7·1 answer
  • 7.2 code practice edhesive. I need help!!
    13·1 answer
  • Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
    10·2 answers
  • Paragraph on uses of computer 100 words plss​
    11·1 answer
  • When a ____________ file is opened, it appears full-screen, in slideshow mode, rather than in edit mode.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!