_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers.

A. ?Vishing
B. ?Smishing
C. ?Phishing
D. ?Pharming

Answer: C

Computer Science & Information Technology

You might also like to view...

Sound recorder software is used to capture sound from a microphone and _____ is used to capture sound from a CD.

A. ?tracing software B. ?burning software C. ?ripping software D. ?authoring software

Computer Science & Information Technology

The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.?

A. ?total field B. ?report header C. ?report footer D. ?character field

Computer Science & Information Technology