Which of the following is described as an attacker who pretends to be from a legitimate research firm who asks for personal information?

A. Dumpster diving
B. Phishing
C. Stealing
D. Pretexting


Answer: D

Computer Science & Information Technology

You might also like to view...

What does Virtual Machine Manager communicate with on host computers?

A. portal B. script C. agent D. console

Computer Science & Information Technology

The title of the table ____.

A. appears as part of the table and remains visible B. appears only when the mouse pointer passes over the table C. never appears in the browser D. appears only when the whole table is selected

Computer Science & Information Technology

An Input mask controls what can and cannot be entered in a field

Indicate whether the statement is true or false

Computer Science & Information Technology

Calculating the range, variance, and kurtosis of a data set are all methods used to determine the dispersion of a data set

Indicate whether the statement is true or false.

Computer Science & Information Technology