Laura picked up her phone one evening to find that the Microsoft help desk was calling. Her computer had been running slowly for a while, but she hadn't yet contacted Microsoft to get help. She was pleased to hear that they had found malware on her computer and were calling to assist her in removing it. Laura had previously been a victim of a phishing scheme, so she knew not to give any personal information, but they didn't ask for her credit card information or social security number so she figured they were really going to help. The Microsoft Help desk has asked Laura to go to a website and verify her information so they can help fix her computer. She sees all of her information on the page even though she hasn't given them any information. What type of crime has Laura become a victim
of?
A. E-tailing fraud
B. Trojan horse
C. Phishing
D. Warez
Answer: C
You might also like to view...
The taser was originally developed during the mid-______.
a. 1930s b. 1940s c. 1960s d1970s
In response to delinquency petition a(n) ___________ is scheduled
A. Trial B. Adjudicatory hearing C. Dispositional hearing D. Aftercare hearing
In addition to passwords, networks and databases are usually designed to keep a log of use. In some cases, each time a user accesses a database for records, the node, time, user and nature of the request is recorded. What is the node?
A) The user's password B) The user's Named Officer's Detailed Explanation (NODE) C) The network D) The Workstation
During which period did the United States and NATO allies view the Soviet Union as the prime exporter and sponsor of modern-day terrorism?
a. World War II b. Korean War c. Cold War d. Russian Revolution