CertNexus Related Exams
ITS-110 Exam
Which of the following tools or techniques is used by software developers to maintain code, but also used by hackers to maintain control of a compromised system?
A network administrator is looking to implement best practices for the organization's password policy. Which of the following elements should the administrator include?
Recently, you purchased a smart watch from Company A. You receive a notification on your watch that you missed a call and have a new message. Upon checking the message, you hear the following:
“Hello, my name is Julie Simmons, and I'm with Company A. I want to thank you for your recent purchase and send you a small token of our appreciation. Please call me back at 888-555-1234. You will need to enter your credit card number, so we can authenticate you and ship your gift. Thanks for being a valued customer and enjoy your gift!"
Which of the following types of attacks could this be?