answersLogoWhite

0

He might be dealing with identity theft. It is important to never give information over the phone, even if you think it is someone that you can trust.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

As part of the survey the caller asks him personal questions What type of attack might this be?

pii


Survey the caller asks him personal questions What type of attack might this be?

If the surveyor is calling you and asking a lot of personal questions, it may be a scam. If you do not feel comfortable, hang up immediately.


What characterizes a DDoS attack?

Many hosts participate in a coordinated attack.


What characterizes DDoS attack?

Many hosts participate in a coordinated attack.


What type of attack might this be if you answer your work phone and the person on the other end asks you to participate in a phone survey As part of the survey the caller asks personal questions?

In one context, it may be Social Engineering. However, when a person on the phone asks personal questions this might be the type of attack that could lead to identity theft. This type of attack is a criminal act not a tort. People should be cautious about answering ANY personal questions when *you* did not initiate the phone call. Do not give your name, address, family names, pet names, your email address, and never, ever give your Social Security Number OR Banking information. Each piece of information gives the caller details about you, through which they can build a profile about you, and research you via the Internet. Never give info if promised a gift for doing the survey. The only 'gift' you'll get is a stolen identity.


When do porcupines attack?

they would attack if they felt scared... Wiki Answers


What type of attack is it when are asked personal questions during a survey?

It is a form of social engineering attack known as pretexting, where attackers gather personal information by pretending to be someone they're not to gain trust and manipulate victims into revealing sensitive information. This stolen information can then be used for malicious purposes like identity theft or fraud.


Where can one purchase a personal attack alarm?

One can purchase personal attack alarms from places such as Amazon or eBay, the website of Protect Me First, or a charity website called Resist Attack.


Which part of DNS is most vulnerable to an attack from a malicious user and why?

A Primary Master Server that provides recursive answers is the most vulnerable to an attack from a malicious user because if a Primary Master Server provides recursive answers it is more easily subverted by a DoS attack than one that only provides iterative answers.


Which part of DNS is most vulnerable to an attack from a malicious user an why?

A Primary Master Server that provides recursive answers is the most vulnerable to an attack from a malicious user because if a Primary Master Server provides recursive answers it is more easily subverted by a DoS attack than one that only provides iterative answers.


What type of attack might this be if a person calls you on your work phone and asks you to participate in a phone survey?

Phishing


Battleships that attacked Pearl Harbor?

There were none: There were Japanese Batleships in the fleet, but the attack was made by carrier-borne aircraft. There was also submarine attack. An attack by Japanese midget submarines as attacked & destroyed. The Japanese fleet included 2 battleships but they did not participate in the attack.