Match the phishing attacks to their characteristics

Phishing Attacks Characteristics
6. Spoofing a. changing a Web site IP repeatedly without affecting the domain name
7. Floating windows b. redirecting users' network traffic to undesired sites
8. Botnets c. using company trademarks and logos in emails for online scams
9. Redirectors d. giving money to strangers who promise a larger sum in return
10. 419 fraud e. developing Javascript replicas that are variations of legitimate URLs


Answer: 6. c
7. e
8. a
9. b
10. d

Computer Science & Information Technology

You might also like to view...

________ is a standalone desktop application that has Power View functionality outside of Excel

Fill in the blank(s) with correct word

Computer Science & Information Technology

To insert a blank page or page break tap CTRL + ENTER.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Describe how to create a document that includes a title formatted as one column and centered at the top of the page, and the information on the rest of the page formatted into two columns of equal length.

What will be an ideal response?

Computer Science & Information Technology

?A(n) _________ is another term for a website that is generally available to anyone with an Internet connection.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology