____ is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information by posing as a trustworthy person or business in an apparently official electronic communication.

A. Cross-site scripting
B. Denial of service
C. Phishing
D. SQL injection

Answer: C

Computer Science & Information Technology

You might also like to view...

For each node in a DO/S, the Memory Manager uses a kernel with a ____ algorithm to track the amount of memory that is available.

A. sharing B. stacking C. turning D. paging

Computer Science & Information Technology

Which of the following best describes a workstation client?

A. a computer that hosts network resources B. a computer that offers multiuser access C. a device that acts as a repository for data files D. a computer that runs local applications and accesses data on a host

Computer Science & Information Technology