____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A. Spoofing
B. Phishing
C. Impersonating
D. Acting

Answer: B

Computer Science & Information Technology

You might also like to view...

What are the facilitator’s responsibilities?

What will be an ideal response?

Computer Science & Information Technology

When working with a table, press ____ to move to the next line within the same cell.

A. Tab B. Enter C. Shift-Enter D. Spacebar

Computer Science & Information Technology