Which variation on phishing modifies the user's host file to redirect traffic?
A. spear phishing
B. pharming
C. DNS phishing
D. hijacking
Answer: B
Computer Science & Information Technology
You might also like to view...
Web pages can contain links to other Web pages, which are called ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Linked lists of items are commonly implemented by
A) using an array to hold list items. B) using a function to compute the link to the next item. C) using a class template to represent list items. D) using a structure containing an item and a pointer to the structure type. E) None of the above
Computer Science & Information Technology