Which attack attempts to steal information from victims by tricking them into visiting false or fake Web sites using a spoofed email communication that seems to originate from a legitimate source?
A. Botnet
B. Pharming
C. Phishing
D. Hijacking
Answer: C. Phishing
Computer Science & Information Technology
You might also like to view...
?A network confined to a small geographic area is referred to as a _____.
A. ?LAN (local area network) B. ?WAN (wide area network) C. ?extranet D. ?hypernet
Computer Science & Information Technology
_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
a. Shielding wires b. Adding fluorescent lights c. Adding repeaters to a circuit d. Adding amplifiers to a circuit e. Shorting a circuit
Computer Science & Information Technology