Janet received an email that contained a link to a website that imitated the authentic website of her bank. The email requested her to key in her credit card number, her Social Security number, and her date of birth

She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________.A) distributed denial of service
B) keylogging
C) phishing
D) cache poisoning

C

Business

You might also like to view...

The modular structure is oriented around outsourcing certain pieces of a(n) _____.

Fill in the blank(s) with the appropriate word(s).

Business

The value proposition is operationalized and represented in the customers' minds through:

A) the mission statement. B) annual reports. C) product positioning. D) effective sales pitches.

Business