Which variation on phishing modifies the user's host file to redirect traffic?

A. spear phishing
B. pharming
C. DNS phishing
D. hijacking


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. By convention class names begin with an uppercase letter, and method and variable names begin with a lowercase letter. b. Instance variables exist before methods are called on an object, while the methods are executing and after the methods complete execution. c. A class normally contains one or more methods that manipulate the instance variables that belong to particular objects of the class. d. Instance variables can be declared anywhere inside a class.

Computer Science & Information Technology

?As the author, you can edit a published Sway site by clicking the__________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In a Crosstab query, the column heading is displayed at the ________ of the datasheet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match each term with the correct statement below.

A. > or < B. Separated with a question mark and a colon C. true and false D. A double equal sign E. An alternative to using a series of nested if statements F. Used in the OR operator G. Two possible courses of action H. The logical NOT operator I. Two ampersands J. Tool that helps plan a program's logic by writing down steps in plain English K. Sequence of steps written in diagram form L. Has three operands M. One step follows another unconditionally N. Anything a method does other than altering a local variable or returning a value O. The logical OR operator

Computer Science & Information Technology