____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.
A. Spoofing
B. Phishing
C. Impersonating
D. Acting
Answer: B
Computer Science & Information Technology
You might also like to view...
What are the facilitator’s responsibilities?
What will be an ideal response?
Computer Science & Information Technology
When working with a table, press ____ to move to the next line within the same cell.
A. Tab B. Enter C. Shift-Enter D. Spacebar
Computer Science & Information Technology