Match the phishing attacks to their characteristics
Phishing Attacks Characteristics
6. Spoofing a. changing a Web site IP repeatedly without affecting the domain name
7. Floating windows b. redirecting users' network traffic to undesired sites
8. Botnets c. using company trademarks and logos in emails for online scams
9. Redirectors d. giving money to strangers who promise a larger sum in return
10. 419 fraud e. developing Javascript replicas that are variations of legitimate URLs
Answer: 6. c
7. e
8. a
9. b
10. d
You might also like to view...
________ is a standalone desktop application that has Power View functionality outside of Excel
Fill in the blank(s) with correct word
To insert a blank page or page break tap CTRL + ENTER.
Answer the following statement true (T) or false (F)
Describe how to create a document that includes a title formatted as one column and centered at the top of the page, and the information on the rest of the page formatted into two columns of equal length.
What will be an ideal response?
?A(n) _________ is another term for a website that is generally available to anyone with an Internet connection.
Fill in the blank(s) with the appropriate word(s).