Register
5:00
Stop
CompTIA Security+ - Threat Analysis and Vulnerability Scanning - Social Engineering
Beginner
1/5
A user receives a text message from an individual claiming to be the CEO demanding sensitive information. The user cannot verify the text messages' authenticity. What should the user do?
a.
Do not respond to the text message and report the incident through established company channels
b.
Save the text message as a draft and respond at a later time
c.
Ask a coworker if they have also received a similar text
d.
Reply to the message with the requested information
Beginner