____ involves sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering information.

A. Wardriving
B. Dumpster diving
C. Warchalking
D. Phishing


Answer: D

Computer Science & Information Technology

You might also like to view...

In a client-server network, network clients provide access to software, files, and other resources that are being shared via the network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The best way to review two different documents containing revisions, based from the original document, is to use ________

A) Compare B) Contrast C) View Side by Side D) Combine

Computer Science & Information Technology

A USB 3.0 port only allows USB 3.0 devices to be attached

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____________________ object of a web form is used to compare one object's value with the value of another object or with a constant value.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology