An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?
A. Run defrag on the hard drive
B. Restore the CAD files from backup
C. Replace the hard drive
D. Remove and reinstall the CAD software
Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?
A. Shoulder surfing
C. Social engineering