Sara, the network administrator, was alerted to an unauthorized email that was sent to specific VIPs in the company with a malicious attachment. Which of the following types of attacks is MOST likely being described?

A. Vishing
B. Whaling
C. DDoS
D. Pharming


Ans: B. Whaling

Computer Science & Information Technology

You might also like to view...

Modifying the tab order in a form is easy to do

Indicate whether the statement is true or false

Computer Science & Information Technology

In SharePoint, members of a ________ site gain reputation points through participation, starting discussions, replying to and liking posts, and by specifying best replies

A) team B) project C) blog D) community

Computer Science & Information Technology

____ adds structure to search results by providing the results in a table, or square, instead of as a list of Web sites.

A. Google Chrome B. Google Squared C. Google Bing D. Google Directory

Computer Science & Information Technology

What are the six certifications within CWNP?

What will be an ideal response?

Computer Science & Information Technology