Forging of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source is called ________.

A. spoofing
B. phishing
C. pharming
D. spyware


Answer: A. spoofing
Using fake email sender names so the message appears to be from a different source, so you will trust it. --If you don't know the sender, don't open it.

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. Java does not guarantee which item will be found first when a binarySearch is performed on a List containing multiple elements equivalent to the search key. b. If the search key is found, method binarySearch returns the List index (position relative to 1) of the element containing the search key. c. The binary search algorithm is fast. d. Method binarySearch takes a List as the first argument.

Computer Science & Information Technology

The ____ effect automatically applies shading to enhance the sense of depth and dimension.

A. Shape and Scale B. Absolute and Positive C. 3D D. Positive and Negative

Computer Science & Information Technology

In Project 2013, ________ ignores any project or resources working and nonworking times and schedules a task to 24 hours a day

A) a recurring task B) a team planner C) an elapsed duration D) effort-driven scheduling

Computer Science & Information Technology

Which of the following features is in Windows Vista but not Windows XP?

A. User account control B. 64-bit processor support C. File and folder encryption D. Dual monitor support

Computer Science & Information Technology