The act of using the Internet via e-mail and fake Web pages to pose as someone else in order to get usernames and passwords is called:

a. Phishing
b. Spamming
c. DoS
d. Spoofing

Answer: a. Phishing

Computer Science & Information Technology

You might also like to view...

What will be the status of the snapshot until the snapshot is complete.

A. running B. working C. progressing D. pending

Computer Science & Information Technology

Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?

A. CVE Web site B. CERT C. Microsoft Security Bulletin D. Macromedia security

Computer Science & Information Technology