A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?
The correct answer is:
A. Impersonation
Explanation:
Impersonation refers to an attack where a malicious actor pretends to be someone else, typically by mimicking a legitimate website, email address, or service. In this scenario, the users are accessing emails through a duplicate site that is not controlled by the company, which indicates that the attacker is impersonating the company’s legitimate email platform to deceive users.
I agree, because if they were accessing a site through emails that would be phishing--but they're accessing the emails through a duplicate site --which is impersonation.
The answer is not impersonation, because impersonation refers to:
More about pretending to be someone
Usually person-to-person deception
Doesn't typically involve duplicate sites
Why not C: impersonation refers to pretending to be someone else, but does not necessarily imply a fake site. So, i think the correct answer is phishing
The correct answer is C. Phishing. Phishing involves creating a fake website or email that mimics a legitimate one to trick users into providing sensitive information, such as login credentials. In this scenario, users are accessing emails through a duplicate site that is not run by the company, which is a classic example of phishing.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
jbmac
Highly Voted 3 months agoitsgonnabemay
1 month ago9149f41
Most Recent 1 month, 4 weeks agoEracle
2 months, 2 weeks ago9149f41
2 months, 3 weeks agoadmcdaniel
2 months, 3 weeks agoFhaddad81
3 months ago