84.8k views
2 votes
A threat actor poses as a hiring manager for a company and asks a user for their personal credentials and to log in to a spoofed website that looks genuine. When the user confirms log-in with the spoofed website, their information is obtained. Which of the following is this attack?

a. Phishing
b. Ransomware
c. DDoS
d. SQL Injection

1 Answer

4 votes

Final answer:

The attack is phishing, where a spoofed website is used to deceive users into giving away personal credentials by impersonating a trusted entity.

Step-by-step explanation:

The type of attack described is known as phishing. This is a common attack where a threat actor, or hacker, pretends to be someone trustworthy, in this case, a hiring manager, to deceive the user. They use a spoofed website, which is a fake site designed to look like a real, legitimate website. The user is lured into entering their personal credentials on this website, which are then stolen by the attacker.

User Roy Berris
by
7.7k points