____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.

Fill in the blank(s) with the appropriate word(s).

Phishing

Computer Science & Information Technology

You might also like to view...

Windows firewall with advanced security provides a connections security rule called _______________ that enables specified computers to communicate with computers in an isolated domain without authentication

a. Isolation b. Authentication exemption c. Server-to-server d. Tunnel.

Computer Science & Information Technology

The TCP/IP network model Transport layer connects applications through the use of ____.

A. addresses B. ports C. hubs D. sockets

Computer Science & Information Technology