Which of the following is described as an attacker who pretends to be from a legitimate research firm who asks for personal information?

A. Dumpster diving
B. Phishing
C. Stealing
D. Pretexting

Answer: D

Computer Science & Information Technology

You might also like to view...

A particular object can be referenced inside a collection by referring to the ________ and then the name or number that represents that specific member of that collection

Fill in the blank(s) with correct word

Computer Science & Information Technology

The 802.11 standard can be used to provide wireless access to the Internet using a broadband connection.

a. true b. false

Computer Science & Information Technology