The process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by pretending to be a reputable entity is a ________
A) denial of service attack B) phishing attack
C) Trojan horse attack D) botnet attack
B
Computer Science & Information Technology
You might also like to view...
The first step when locating the highest value in the elements of an array is to create a(n) __________ to hold that value.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
People and businesses create ____ lists to keep track of people that are important to them or to their business.
A. people B. individual C. record D. contact
Computer Science & Information Technology