____ is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information by posing as a trustworthy person or business in an apparently official electronic communication.

A. Cross-site scripting
B. Denial of service
C. Phishing
D. SQL injection

Answer: C

Computer Science & Information Technology

You might also like to view...

What is the purpose of a parameter query? What happens when a parameter query is executed?

What will be an ideal response?

Computer Science & Information Technology

Which of the following describes vertices that are adjacent?

a) They are close to one another in the visual representation of the graph. b) They are far apart in the visual representation of the graph. c) There is no edge connecting them. d) There is an edge connecting them. e) None of the above describes adjacent vertices.

Computer Science & Information Technology