Which variation on phishing modifies the user's host file to redirect traffic?

A. spear phishing
B. pharming
C. DNS phishing
D. hijacking

Answer: B

Computer Science & Information Technology

You might also like to view...

Web pages can contain links to other Web pages, which are called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Linked lists of items are commonly implemented by

A) using an array to hold list items. B) using a function to compute the link to the next item. C) using a class template to represent list items. D) using a structure containing an item and a pointer to the structure type. E) None of the above

Computer Science & Information Technology