Question: 168
When using SSH, you accidentally type your password as the u...
An employee receives an email requesting their login credentials to verify their account information. Believing the request to be legitimate, they provide the details, leading to unauthorized access to sensitive company data. Which type of attack does this scenario illustrate, and which component of the CIA Triad is compromised?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!