网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
A

Phishing scam

B

Social engineering

C

Man-in-the-Middle

D

Shoulder surfing


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing” 相关考题
考题 单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A Update antivirus definitionsB MAC filteringC Effective security policiesD User awareness training

考题 单选题A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()A The switches are not stackableB The cable was not wired using 568AC The cable needs to be a crossover cableD The switches have IGMP snooping enabled

考题 单选题Which of the following is primarily used for VoIP?()A TLSB RDFC NTPD RTP

考题 单选题Which of the following devices is used to connect a WAN to a LAN?()A Basic routerB Basic switchC BridgeD Repeater

考题 单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A NTPB FTPC RTPD IGMP

考题 单选题An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?()A Layer 1B Layer 4C Layer 5D Layer 7

考题 单选题A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()A The wrong cable type has been used.B . IDS has shut down the computer's switch port.C The port on the switch is configured incorrectlyD Spanning tree protocol was implemented.

考题 单选题Which of the following does not affect security on a wireless access point?()A EncryptionB DHCPC PasswordD SSID

考题 单选题A Stateful firewall is MOST useful in protecting against which of the following network scans?()A PINGB UDPC XmasD ACK

考题 单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A IS-ISB BGPC OSPFD RIP

考题 单选题Which of the following is used to create multiple networks from one large network?()A PATB NATC MulticastD Subnetting