____ is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information by posing as a trustworthy person or business in an apparently official electronic communication.
A. Cross-site scripting
B. Denial of service
C. Phishing
D. SQL injection
Answer: C
Computer Science & Information Technology
You might also like to view...
For each node in a DO/S, the Memory Manager uses a kernel with a ____ algorithm to track the amount of memory that is available.
A. sharing B. stacking C. turning D. paging
Computer Science & Information Technology
Which of the following best describes a workstation client?
A. a computer that hosts network resources B. a computer that offers multiuser access C. a device that acts as a repository for data files D. a computer that runs local applications and accesses data on a host
Computer Science & Information Technology