Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assume you are a network technician for a mid-size company. You're often at the office on Saturday afternoons to catch up on work without disruption.

Assume you are a network technician for a mid-size company. You're often at the office on Saturday afternoons to catch up on work without disruption. You get a phone call from a person who identifies himself as the new assistant to a company vice president. He says the VP is traveling internationally and needs access to certain sensitive files on the server but cannot access it. The assistant needs the VP's network credentials to locate the files, and he is worried he will be fired if he doesn't get the information quickly. You've never spoken directly to the VP and are not familiar with the assistant.

You are not sure if this is a legitimate request or a social engineering scam. What is the best way to handle this situation?

Step by Step Solution

3.45 Rating (148 Votes )

There are 3 Steps involved in it

Step: 1

ts important to exercise caution to ensure the security of sensitive information Heres how you can h... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Project Management The Managerial Process

Authors: Eric W Larson, Clifford F. Gray

8th Edition

1260570436, 978-1260570434

More Books

Students also viewed these Computer Network questions

Question

What is a performance report, and how is it used?

Answered: 1 week ago