Sara, the network administrator, was alerted to an unauthorized email that was sent to specific VIPs in the company with a malicious attachment. Which of the following types of attacks is MOST likely being described?
A. Vishing
B. Whaling
C. DDoS
D. Pharming
Ans: B. Whaling
Computer Science & Information Technology
You might also like to view...
Modifying the tab order in a form is easy to do
Indicate whether the statement is true or false
Computer Science & Information Technology
In SharePoint, members of a ________ site gain reputation points through participation, starting discussions, replying to and liking posts, and by specifying best replies
A) team B) project C) blog D) community
Computer Science & Information Technology
____ adds structure to search results by providing the results in a table, or square, instead of as a list of Web sites.
A. Google Chrome B. Google Squared C. Google Bing D. Google Directory
Computer Science & Information Technology
What are the six certifications within CWNP?
What will be an ideal response?
Computer Science & Information Technology