answersLogoWhite

0


Best Answer

Social Engineering

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: A hacker who attempts to gain system information from an employee by posing as a service technician or system administrator is using what type of hacking technique?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

A hacker who attempts to gain system information from an employee by posing as a serice technician or system administrator is using what type of hacking technique?

social engineering


What preservation technique that attempts to remove moisture?

Slating is one.


Why should a network administrator limit the number of logon attempts to a server?

To prevent the server to get overloaded


How do you unlock your computer after failed attempts to login?

You need to go in at the administrator level and reset it. If you have locked out the administrator account your only option is to flatten (format) the machine and reload all the software.


The information bar alerts you when a page attempts to load?

malware


What occurs when a person attempts to glean access or authentication information by posing as someone who needs that information?

phishing


Is a scam in which a perpetrator attempts to obtain your personal or financial information?

Phiching


What is the scam in which a perpetrator attempts to obtain your personal and or financial information?

phishing


Are attempts by individuals to obtain confidential information from you?

Phishing Scams


What information was stolen when the First Caribbean Bank was hacked?

There have been many previous attempts to hack the First Caribbean Bank. However, these hacking attempts do not appear to have been successful in stealing one's information.


What Is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information?

This practice is known as phishing, where an attacker impersonates a legitimate entity to deceive victims into providing sensitive information such as passwords or credit card details. Phishing is commonly carried out through emails, phone calls, or text messages, and aims to exploit human psychology and trust to gain unauthorized access to accounts or data. It is important to be cautious and verify the authenticity of requests for personal information to protect against phishing attacks.


Is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who need that information?

phishing