_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers.
A. ?Vishing
B. ?Smishing
C. ?Phishing
D. ?Pharming
Answer: C
Computer Science & Information Technology
You might also like to view...
Sound recorder software is used to capture sound from a microphone and _____ is used to capture sound from a CD.
A. ?tracing software B. ?burning software C. ?ripping software D. ?authoring software
Computer Science & Information Technology
The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.?
A. ?total field B. ?report header C. ?report footer D. ?character field
Computer Science & Information Technology