"4-1-9" fraud is an example of a __________ attack.
A. social engineering
B. virus
C. worm
D. spam
Answer: A
Computer Science & Information Technology
You might also like to view...
Image maps stored on a server are easier to work with than client-side image maps
Indicate whether the statement is true or false
Computer Science & Information Technology
Some military experts suggest that our future defense will rely more on ________ officers than on tanks and artillery
Fill in the blank(s) with correct word
Computer Science & Information Technology