Which of the following attacks is described?

A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources. Which of the following attacks is described?
A. Logic bomb
B. Social engineering
C. Trojan horse
D. Insider threat

Exam N10-008: CompTIA Network+

Free dumps for N10-008 in PDF format.

High quality N10-008 PDF and software. VALID exam to help you pass.

comptia-exams

One thought on “Which of the following attacks is described?

  1. ” internal number” would be someone in the building aka inside the building with would most likely be an insider

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.