{"id":6417,"date":"2022-12-01T18:59:20","date_gmt":"2022-12-01T12:59:20","guid":{"rendered":"https:\/\/mcqacademy.com\/en\/?post_type=mcq&#038;p=6417"},"modified":"2022-12-01T19:26:17","modified_gmt":"2022-12-01T13:26:17","slug":"a-user-receives-a-phone-call-from-a-person-who-claims-to-password-for-auditing-purposes-which-security-threat-does-this-phone-call-represent","status":"publish","type":"mcq","link":"https:\/\/mcqacademy.com\/en\/mcq\/a-user-receives-a-phone-call-from-a-person-who-claims-to-password-for-auditing-purposes-which-security-threat-does-this-phone-call-represent\/","title":{"rendered":"A user receives a phone call from a person who claims to &#8230; password for auditing purposes. Which security threat does this phone call represent?"},"content":{"rendered":"\n<p>A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?<\/p>\n","protected":false},"author":1158,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","topic":[955],"subject":[954],"class_list":["post-6417","mcq","type-mcq","status-publish","hentry","topic-introduction-to-computer-studies","subject-information-technology-essentials"],"mcq_note":"<strong>Explanation:<\/strong>\r\n\r\nSocial engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software-based security threats, not social engineering.","mcq_options":[{"right":"no","answer":"DDoS"},{"right":"no","answer":"spam"},{"right":"no","answer":"social engineering"},{"right":"no","answer":"anonymous keylogging"}],"multi_answers":"no","subject_terms":[{"id":954,"title":"Information Technology Essentials (ITE)","slug":"information-technology-essentials"}],"topic_terms":[{"id":955,"title":"Introduction to Computer Studies","slug":"introduction-to-computer-studies"}],"_links":{"self":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/mcq\/6417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/mcq"}],"about":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/types\/mcq"}],"author":[{"embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/users\/1158"}],"replies":[{"embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/comments?post=6417"}],"wp:attachment":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/media?parent=6417"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/topic?post=6417"},{"taxonomy":"subject","embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/subject?post=6417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}