An e-mail-based scam that's designed to persuade you to reveal confidential information is called ____.

A. surfing
B. phishing
C. scanning
D. searching


Answer: B

Computer Science & Information Technology

You might also like to view...

The function that accepts a C-string containing a number as its argument and returns the integer equivalent is

a. strToInt b. itoa c. atoi d. int_from e. None of these

Computer Science & Information Technology

The ____________________ is a specification for the database fields and their characteristics.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Old-fashioned _________________________ advertising-telling friends, family, and other interested parties about your Web site-can be a free, helpful way to drive traffic to all types of Web sites.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

On what resource does a DMA attack focus?

A. CPU B. NIC C. memory D. hard drive

Computer Science & Information Technology