Which one of the following is not a type of phishing attack?
a. Whaling
b. Smishing
c. Spear phishing
d. Wishing
Answer: d. Wishing
You might also like to view...
What is one of the first things to be done after a recovery or drill?
A) Decide who is at fault for any failures in the system. B) Have everyone that was involved sit down and debrief. C) Notify the disaster recovery team that a disaster has taken place. D) All of the above
A networked laser printer has toner, power, documents in the queue, and the network port has connectivity, but no network host can print to the printer. What should the technician check?
A) Whether the printer is online B) Whether the printer LCD works C) Whether the print spooler service is running D) Whether the network printer cable is good
Event procedures are always Sub procedures.
Answer the following statement true (T) or false (F)
Computers that are placed inside other pieces of equipment to control their operation are called ____ systems.
integrated virtual baseline embedded