Jane, a security analyst, noticed an increase in malware infections on a user's system. She identified an email that requests the user change her password. This attack would BEST be described as which of the following?
A. Phishing
B. Spoofing
C. Privilege escalation
D. Shoulder surfing
Answer: A. Phishing
You might also like to view...
All of the following are true of an ostringstream object except that:
a. It uses a string to store output data. b. A stream insertion operation cannot be used to append additional data to it. c. The string data it stores is dynamically allocated. d. The data it stores can be accessed using the function str.
Use the ____ function to test an input value to ensure that it is numeric.
A. IsNumber B. IsNumeric C. TestNumber D. TestNumeric
You can view all comments in a worksheet at one time if you want to
Indicate whether the statement is true or false.
The W3C is an organization that helps build consensus around changes and additions to the HTML language.
Answer the following statement true (T) or false (F)