Terms

16 new/unreviewed 16 total

Term

Which type of online threat uses communications claiming to be from a legitimate source to trick you into giving personal information?

Definition

c. Phishing

New/Unreviewed

Term

Claire downloaded a photo editing app. The next day, she found out her email account had been hacked. Which of the following is the most likely cause?

Definition

d. Trojan

New/Unreviewed

Term

As Amaya is leaving the office cafeteria, she notices a USB drive on the floor. She picks it up and sees it is labeled with a department number only. When she returns to her desk, she plugs the USB drive into her computer to see if she can determine the owner. This is an example of _______________, a social engineering tactic.

Definition

a. baiting

New/Unreviewed

Practice Tests

0 total
(None) Completed practice tests will show up here