Which of the following security threats?

A user receives a phone call from a person claiming to be from technical support. This person knows the user’s name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?
A. Social engineering
B. Phishing
C. Malware
D. Virus

CompTIA A+ 220-1102 (Core 1) Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.