____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A. Framing
B. Fishing
C. Pharming
D. Farming

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following devices is used to connect to a WAN?

A. Hub B. Switch C. Router D. MUX

Computer Science & Information Technology

You can use a(n) ____________ as an alternative to implementing MySQL user passwords.

a. passphrase b. authentication plugin c. PIN d. biometric

Computer Science & Information Technology