Purchasing receives an automated phone call from a bank asking to input and verify credit card information. The phone number displayed on the caller ID matches the bank. Which of the following attack types is this?
A. Hoax
B. Phishing
C. Vishing
D. Whaling
Answer: C. Vishing
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a movement of the user's finger, fingers, or pen on a touch screen resulting in a particular action
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Some people use the term m-commerce (mobile commerce) to identify e-commerce that takes place using mobile devices.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which button do you use to insert a link to an e-mail address?
A. WordArt B. SmartArt C. Hyperlink D. Text Box
Computer Science & Information Technology
As shown in the accompanying figure, Word shades a shaded area from the left margin to the right margin of the current paragraph.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology