Purchasing receives an automated phone call from a bank asking to input and verify credit card information. The phone number displayed on the caller ID matches the bank. Which of the following attack types is this?

A. Hoax
B. Phishing
C. Vishing
D. Whaling


Answer: C. Vishing

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a movement of the user's finger, fingers, or pen on a touch screen resulting in a particular action

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Some people use the term m-commerce (mobile commerce) to identify e-commerce that takes place using mobile devices.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which button do you use to insert a link to an e-mail address?

A. WordArt B. SmartArt C. Hyperlink D. Text Box

Computer Science & Information Technology

As shown in the accompanying figure, Word shades a shaded area from the left margin to the right margin of the current paragraph.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology