A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

A. mail fraud
B. heuristics
C. ransoming
D. social engineering

Answer: D

Computer Science & Information Technology

You might also like to view...

The different array of computers, peripherals, and media is called network ________

A) topology B) typography C) geography D) epistemology

Computer Science & Information Technology

When the data presented in a chart is difficult to interpret, change the chart ________

A) background color B) font type and size C) orientation D) type

Computer Science & Information Technology