Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
A. spam
B. spit
C. phishing
D. spyware
Answer: C
You might also like to view...
If a selection sort is used to arrange the numbers 8 6 4 9 3 7 in ascending order, what order will the data be in after the first pass of the sort is completed?
A) 3 4 6 7 8 9 B) 3 6 4 9 8 7 C) 6 4 8 3 7 9 D) 6 8 4 9 3 7 E) None of the above
The object ________ in Visual Basic organizes all objects into an object hierarchy
Fill in the blank(s) with correct word
Which of the following best describes the responsibilities of custodians of information resources?
A. Establish and maintain security and risk management programmes for information resources. B. Direct policies and procedures designed to protect information resources. C. Provide technical facilities, data processing, and other support services to owners and users of information resources. D. Provide technical support for security of information resources.
Which of the following is the use of computers to simulate a real or imagined environment that appears as three-dimensional (3-D) space?
A. IrDA B. POP C. VR D. TCP