Match the phishing attacks to their characteristics

Phishing Attacks Characteristics
6. Spoofing a. changing a Web site IP repeatedly without affecting the domain name
7. Floating windows b. redirecting users' network traffic to undesired sites
8. Botnets c. using company trademarks and logos in emails for online scams
9. Redirectors d. giving money to strangers who promise a larger sum in return
10. 419 fraud e. developing Javascript replicas that are variations of legitimate URLs

Answer: 6. c
7. e
8. a
9. b
10. d

Computer Science & Information Technology

You might also like to view...

A predesigned set of colors, fonts, lines, and fill effects that look good together and that can be applied across all Office 2016 applications is called a ________

A) style B) design C) theme D) layout

Computer Science & Information Technology

What standard's implementation is built around periodic assessments of risk and feedback obtained during preventive maintenance inspections of the effectiveness of each control?

A. NIST 800-53 B. FIPS 200 C. FIPS 199 D. HIPAA

Computer Science & Information Technology