Terms
16 new/unreviewed 16 total
Term
Which type of online threat uses communications claiming to be from a legitimate source to trick you into giving personal information?
Definition
c. Phishing
New/Unreviewed
Term
Claire downloaded a photo editing app. The next day, she found out her email account had been hacked. Which of the following is the most likely cause?
Definition
d. Trojan
New/Unreviewed
Term
As Amaya is leaving the office cafeteria, she notices a USB drive on the floor. She picks it up and sees it is labeled with a department number only. When she returns to her desk, she plugs the USB drive into her computer to see if she can determine the owner. This is an example of _______________, a social engineering tactic.
Definition
a. baiting
New/Unreviewed
Practice Tests
0 total
(None) Completed practice tests will show up here