CompTIA Network+ Exam: N10-007 Practice Questions

Which Type of Attack is Described in This Scenario?

Prev Question Next Question

Question

A user believes a work email account has been compromised.

A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account.

Which of the following types of attack is described in this scenario?

A.

Spam B.

Ransomware C.

Man-in-the-middle D.

Phishing.

C.

Explanations

A user believes a work email account has been compromised.

A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account.

Which of the following types of attack is described in this scenario?

A.

Spam

B.

Ransomware

C.

Man-in-the-middle

D.

Phishing.

C.

The scenario describes a situation where a user suspects that their work email account has been compromised. The technician investigating the issue discovers that an email that appears to be from the user's bank has the same origin IP address as the last login to the email account. This suggests that the email may be part of a phishing attack.

Phishing is a type of cyber attack where an attacker sends an email that appears to be from a legitimate source (such as a bank, social media platform, or email provider) to a user in an attempt to trick them into revealing sensitive information, such as login credentials or financial data. The attacker may use social engineering techniques to make the email seem urgent or important, or they may use a spoofed email address or website to make the email appear legitimate.

In the scenario described, the fact that the email shares the same origin IP address as the last login to the email account suggests that the attacker may have gained access to the user's account and is using it to send phishing emails. This is a common tactic used by attackers to make their emails seem more legitimate, as they can use the user's own email account to send the message.

To prevent phishing attacks, it's important for users to be vigilant when opening emails and to never click on links or download attachments from unknown or suspicious sources. It's also important to use strong and unique passwords for all online accounts and to enable two-factor authentication whenever possible. Organizations can also implement security measures such as email filters, web filters, and employee training programs to help prevent phishing attacks.