Question 3) Phishing attacks are often sent from spoofed domains that look just like popular real domains. What kind of attack are you likely under ? While her name is that of the real VP, she explains that she is using her personal email system since her company account is having problems. She wants you to send her a zip file of your design documents so she can review them. The email is addressed to you and was sent by someone who identifies herself as the VP of your Product division. Question 2) You are working as an engineer on the design of a new product your company hopes will be a big seller when you receive an email from someone you do not personally know. Send an email from an address that very closely resembles a legitimate address.Make an urgent request to cause the recipient to take quick action before thinking carefully.Sending an email with a fake invoice that is overdue.Breaking in to an office at night and installing a key logging device on the victim's computer. Question 1) Which three (3) techniques are commonly used in a phishing attack ? (Select 3)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |