The act of using the Internet via e-mail and fake Web pages to pose as someone else in order to get usernames and passwords is called:
a. Phishing
b. Spamming
c. DoS
d. Spoofing
Answer: a. Phishing
Computer Science & Information Technology
You might also like to view...
What will be the status of the snapshot until the snapshot is complete.
A. running B. working C. progressing D. pending
Computer Science & Information Technology
Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?
A. CVE Web site B. CERT C. Microsoft Security Bulletin D. Macromedia security
Computer Science & Information Technology