81.7k views
2 votes
Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?

A. A spear-phishing email with a file attachment
B. A DoS using IoT devices
C. An evil twin wireless access point
D. A domain hijacking of a bank website

User FredBones
by
7.5k points

1 Answer

3 votes

Final answer:

A spear-phishing email with a file attachment is an attack that exploits vulnerabilities due to untrained users by using social engineering to trick them into giving out sensitive information or installing malware.

Step-by-step explanation:

The attack that can be used to exploit a vulnerability created by untrained users is A. A spear-phishing email with a file attachment. Attacks like these rely on social engineering techniques to deceive users into revealing sensitive information or installing malicious software. Unlike broad phishing attacks, spear-phishing emails are highly targeted and often appear as legitimate communication from a trusted source, which increases the likelihood of the recipient taking the bait. An email may look like it's from a well-known company, for example, prompting users to click on a link that leads to a fake login page or to open an attachment that installs malware on their device.

Hackers use a variety of methods to break into websites, to manipulate people into clicking on malicious links, and to persuade individuals to divulge confidential details. It's essential to educate users on the potential risks and to emphasize the importance of being cautious when handling email attachments or clicking on links, especially if they're unexpected or from an unknown sender. Awareness and training can significantly reduce the risk of such attacks succeeding.

User Xenonite
by
7.6k points