A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources.
Which of the following attacks is described?
A . Logic bomb
B . Social engineering
C . Trojan horse
D . Insider threat
Answer: B
Latest N10-007 Dumps Valid Version with 601 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund