____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.?

A. ?List linking
B. ?Phishing
C. ?E-mail spoofing
D. ?419

Answer: A

Computer Science & Information Technology

You might also like to view...

Change the background color of a slide by clicking the DESIGN tab, then selecting Format Background from the _________ group.

A. Themes B. Customize C. Select D. Variants

Computer Science & Information Technology

Which HTTP error informs you the server understands the request but refuses to comply?

A. 401 Unauthorized B. 404 Not Found C. 403 Forbidden D. 409 Conflict

Computer Science & Information Technology