单项选择题
A user receives a call from someone reporting to be from the help desk who asks for their
password. The user discovers later that the caller did not work for the help desk.
Which of the following describes this type of exploit?()
A. Phishing scam
B. Social engineering
C. Man-in-the-Middle
D. Shoulder surfing
点击查看答案
相关考题
-
单项选择题
Which of the following networks are reserved for private IP addresses?()
A. 168.129.00/24
B. 172.16.128.0/15
C. 192.168.0.0/16
D. 162.17.0.0/12 -
单项选择题
Which of the following has a maximum data rate of 11Mbps?()
A.802.11n
B.802.11g
C.802.11b
D.802.11a -
单项选择题
Which of the following tools can be used to identify the location of a network outage?()
A.traceroute
B.netstat
C.nslookup
D.ping
