Which attack attempts to steal information from victims by tricking them into visiting false or fake Web sites using a spoofed email communication that seems to originate from a legitimate source?

A. Botnet
B. Pharming
C. Phishing
D. Hijacking

Answer: C. Phishing

Computer Science & Information Technology

You might also like to view...

?A network confined to a small geographic area is referred to as a _____.

A. ?LAN (local area network) B. ?WAN (wide area network) C. ?extranet D. ?hypernet

Computer Science & Information Technology

_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.

a. Shielding wires b. Adding fluorescent lights c. Adding repeaters to a circuit d. Adding amplifiers to a circuit e. Shorting a circuit

Computer Science & Information Technology