The entire basis of a whaling attack is to ___________.
A) appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses.
B) be as ambiguous and broad as possible so that no one person is targeted; rather, a large division in a company is.
C) appeal to as many companies as possible at the same time, therefore increasing the likelihood that one will "take the bait."
D) establish a line of communication with an entry-level employee or employees first to gain trust, and then gain access to larger systems.
Correct Answer:
Verified
Q36: _ is an unintentional threat.
A) Espionage
B) Identity
Q37: _ is a deliberate act that involves
Q38: Keystroke loggers and screen scrapers are examples
Q39: _ is pestware that users your computer
Q40: Intellectual property is NOT protected under _
Q42: Dyn is a cloud-based internet performance management
Q43: Dyn's hackers formed a botnet from _.
A)
Q44: The U.S. government considers the Sony hack
Q45: If you accept the potential risk, continue
Q46: An employee at ABC Inc. downloaded an
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents