____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.?
A. ?List linking
B. ?Phishing
C. ?E-mail spoofing
D. ?419
Answer: A
Computer Science & Information Technology
You might also like to view...
Change the background color of a slide by clicking the DESIGN tab, then selecting Format Background from the _________ group.
A. Themes B. Customize C. Select D. Variants
Computer Science & Information Technology
Which HTTP error informs you the server understands the request but refuses to comply?
A. 401 Unauthorized B. 404 Not Found C. 403 Forbidden D. 409 Conflict
Computer Science & Information Technology