Which of the following is the process to try to induce someone to provide you with personal information?
a. Cyberstalking
b. Looping
c. Phishing
d. Licensing
Answer C. One form of phishing is cross-site scripting, in which an attacker posts a script on an interactive website. This script redirects an unsuspecting user to a phishing website.
Computer Science & Information Technology
You might also like to view...
Under MVS, the __________ holds system constants and pointers to most of the key control blocks.
a. task control block b. request block c. stack d. communication vector table
Computer Science & Information Technology
You can print a ____ view of your calendar.
A. monthly B. daily C. weekly D. yearly
Computer Science & Information Technology