Computer Science, asked by jaswanthRao6681, 10 months ago

An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario?

Answers

Answered by deesahant
15

the caller sternly commands are very useful to the e-mail address.

Answered by Pratham2508
0

Answer:

The type of social engineering tactic used in this scenario is intimidation.

Explanation:

  • A social engineering tactic is used for the purpose of obtaining information from the victim of this tactic.
  • The phrase "social engineering" is used to describe a wide variety of malevolent behaviors carried out through interactions with other people.
  • Users are duped into divulging critical information or committing security blunders via psychological manipulation.
  • Attacks by social engineers may involve one or more phases.
  • To prepare for an assault, a perpetrator first looks into the target in order to learn background details like probable avenues of entry and lax security measures.
  • The attacker next makes an effort to win over the victim's confidence and offers incentives for later security-breaking activities, such as disclosing confidential information or allowing access to vital resources.
  • In this case, intimidation is used by the manager against the secretary.

#SPJ2

Similar questions