Match the phishing attacks to their characteristics
Phishing Attacks Characteristics
6. Spoofing a. changing a Web site IP repeatedly without affecting the domain name
7. Floating windows b. redirecting users' network traffic to undesired sites
8. Botnets c. using company trademarks and logos in emails for online scams
9. Redirectors d. giving money to strangers who promise a larger sum in return
10. 419 fraud e. developing Javascript replicas that are variations of legitimate URLs
Answer: 6. c
7. e
8. a
9. b
10. d
You might also like to view...
A predesigned set of colors, fonts, lines, and fill effects that look good together and that can be applied across all Office 2016 applications is called a ________
A) style B) design C) theme D) layout
What standard's implementation is built around periodic assessments of risk and feedback obtained during preventive maintenance inspections of the effectiveness of each control?
A. NIST 800-53 B. FIPS 200 C. FIPS 199 D. HIPAA