20.3k views
4 votes
Ann, a security manager, is reviewing a threat feed that provides information about attacks that allow a malicious user to gain access to private contact lists. Ann receives a notification that the vulnerability can be exploited within her environment.

Given this information, Ann can anticipate an increase in:

A. vishing attacks
B. SQL injections attacks
C. web application attacks
D. brute-force attacks

User Protheus
by
7.4k points

1 Answer

6 votes

Final answer:

With the information about the vulnerability allowing access to private contact lists, Ann, the security manager, can expect an upsurge in vishing attacks, as this data is typically used in targeted phone scams.

Step-by-step explanation:

Ann, a security manager, is reviewing a threat feed that alerts her to vulnerabilities that could expose private contact lists to malicious users.

From the given notification, Ann can anticipate an increase in vishing attacks. Access to private contact lists would likely facilitate such attacks by providing attackers with the information they need to conduct targeted phishing attempts over the phone, impersonating credible entities to extract further sensitive information from unsuspecting individuals.

Based on the information provided, Ann, the security manager, is reviewing a threat feed that indicates a vulnerability within her environment that allows a malicious user to gain access to private contact lists

In this scenario, Ann can anticipate an increase in vishing attacks. Vishing attacks, also known as voice phishing, involve manipulating individuals into disclosing sensitive information over the phone.

User Dominik Serafin
by
7.5k points