The process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by pretending to be a reputable entity is a ________

A) denial of service attack B) phishing attack
C) Trojan horse attack D) botnet attack

B

Computer Science & Information Technology

You might also like to view...

The first step when locating the highest value in the elements of an array is to create a(n) __________ to hold that value.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

People and businesses create ____ lists to keep track of people that are important to them or to their business.

A. people B. individual C. record D. contact

Computer Science & Information Technology