The technique used to trick computer users into disclosing personal or financial information through an email message or a website is called ________
A) phishing B) browsing C) pharming D) surfing
A
Computer Science & Information Technology
You might also like to view...
A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices
A) PAN B) WLAN C) WAN D) MAN
Computer Science & Information Technology
A user moves from one office to another. When the user logs onto their computer, it has local access to shared drives but no Internet access. A technician determines that the computer has an IP address in the wrong subnet. Which of the following is MOST likely the cause?
A. Incorrect VLAN B. MTU mismatch C. Hijacked HOSTS file D. Missing routes
Computer Science & Information Technology