____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
A. Framing
B. Fishing
C. Pharming
D. Farming
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following devices is used to connect to a WAN?
A. Hub B. Switch C. Router D. MUX
Computer Science & Information Technology
You can use a(n) ____________ as an alternative to implementing MySQL user passwords.
a. passphrase b. authentication plugin c. PIN d. biometric
Computer Science & Information Technology