A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?
A. mail fraud
B. heuristics
C. ransoming
D. social engineering
Answer: D
Computer Science & Information Technology
You might also like to view...
The different array of computers, peripherals, and media is called network ________
A) topology B) typography C) geography D) epistemology
Computer Science & Information Technology
When the data presented in a chart is difficult to interpret, change the chart ________
A) background color B) font type and size C) orientation D) type
Computer Science & Information Technology