Sending an email that claims to come from a different sender, and asking for sensitive data is an example of ___________
a. Phishing
b. Key logging
c. Social engineering
d. None of the above
Answer C. In large organizations, you cannot know every member, and it might be easy to forge and email.
Computer Science & Information Technology
You might also like to view...
The Windows ________ utility rearranges fragmented files on a hard drive in order to improve efficiency
A) Check Disk B) Optimize Drives C) Error Checking D) Disk Cleanup
Computer Science & Information Technology
You can overload an operator for a built-in data type. For example, you can change the meaning of + between two ints.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology