A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?

A. Phishing
B. Smurf attack
C. Denial of service
D. Man-in-the-middle

Answer: A. Phishing

Computer Science & Information Technology

You might also like to view...

Polymorphism allows for specifics to be dealt with during:

a. execution. b. compilation. c. programming. d. debugging.

Computer Science & Information Technology

Write a program that allows the user to compute the remainder after the division of two integer values. The remainder of x / y is x % y. Catch any exception thrown and allow the user to enter new values.

What will be an ideal response?

Computer Science & Information Technology