Which of the following is described as an attacker who pretends to be from a legitimate research firm who asks for personal information?
A. Dumpster diving
B. Phishing
C. Stealing
D. Pretexting
Answer: D
Computer Science & Information Technology
You might also like to view...
A particular object can be referenced inside a collection by referring to the ________ and then the name or number that represents that specific member of that collection
Fill in the blank(s) with correct word
Computer Science & Information Technology
The 802.11 standard can be used to provide wireless access to the Internet using a broadband connection.
a. true b. false
Computer Science & Information Technology