____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.
A. Phishing
B. Pharming
C. Blasting
D. Fishing
Answer: A
You might also like to view...
Cloud backup and cloud storage are the same
Indicate whether the statement is true or false
Advocates for autonomous vehicles argue that these vehicles do all of the except _______ .
A. create more jobs for car and truck drivers B. save lives C. lower the cost of transporting goods D. provide transportation for people with disabilities
Identify the letter of the choice that best matches the phrase or definition.
A. A narrow recording band that forms a full circle on the surface of the disk B. Optical disc whose quality far surpasses that of CDs C. The number of bits in an area on a storage medium D. A group of two or more integrated hard disks E. Administrators can quickly add storage to their network with this kind of device F. A hard disk that uses parallel signals to transfer data, instructions, and information G. A type of SCSI that uses serial signals to transfer data, instructions, and information H. A storage device that typically uses flash memory to store data, instructions, and information I. Also called a thumb drive J. Sometimes used in descriptions of a storage device's capabilities, instead of access time K. Technology that uses radio signals to communicate with a tag placed in or attached to an object, animal, or a person L. The operating system marks bad ones as unusable when a disk is formatted M. Its reliability tends to diminish with each successive rewrite N. Optical disc that users can read but not write on or erase O. Optical disc on which users can write once, but not erase, their own items
Which of the following provides improved access to quality data for operational decision making, elimination of costly and inflexible legacy systems, and simplified consolidation of financial data?
a. An enterprise resource planning system b. A customer relationship management system c. A risk and threat management system d. A disaster and safety management system