A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as

a. spear phishing.
b. pretexting.
c. keystroke logging.
d. logic bombing.

A

Computer Science & Information Technology

You might also like to view...

A service is a program that runs in the foreground and is visible on the taskbar.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

A. firewall B. DMZ C. honeypot D. IDS

Computer Science & Information Technology