Which one of the following is not a type of phishing attack?

a. Whaling
b. Smishing
c. Spear phishing
d. Wishing


Answer: d. Wishing

Computer Science & Information Technology

You might also like to view...

What is one of the first things to be done after a recovery or drill?

A) Decide who is at fault for any failures in the system. B) Have everyone that was involved sit down and debrief. C) Notify the disaster recovery team that a disaster has taken place. D) All of the above

Computer Science & Information Technology

A networked laser printer has toner, power, documents in the queue, and the network port has connectivity, but no network host can print to the printer. What should the technician check?

A) Whether the printer is online B) Whether the printer LCD works C) Whether the print spooler service is running D) Whether the network printer cable is good

Computer Science & Information Technology

Event procedures are always Sub procedures.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Computers that are placed inside other pieces of equipment to control their operation are called ____ systems.

integrated virtual baseline embedded

Computer Science & Information Technology