Kenneth is working on a confidential government project. Daniel, a coworker, and he are the only two members who are authorized to access the project's information system

Kenneth, while away on a business trip, receives an email from Daniel asking for his login credentials as Daniel was unable to access the system. Kenneth finds the request unusual, and calls Daniel to confirm if the email was sent by him. Kenneth deletes the email when he learns that Daniel had not sent it. This scenario is an example of attempted ________.A) hacking
B) phishing
C) sniffing
D) wardriving


B

Business

You might also like to view...

Academic research has found that market rates of return on common stock are the most highly correlated with

a. net income. b. cash flow from operations. c. EBITDA. d. cash flow from investing activities.

Business

Which market exchange uses a computerized quotation system called NASDAQ?

a. the New York Stock Exchange b. bond markets c. mutual fund markets d. over-the-counter markets e. commodities markets

Business

A full-line discount store that combines a grocery store, pharmacy, and services is called a ________.

Fill in the blank(s) with the appropriate word(s).

Business

Which of the following is true about environmental impact statements?

A) The public is not allowed to comment on environmental impact statements. B) They are required only for projects where the federal government itself undertakes the actual construction of the project. C) Private activities also require an environmental impact statement. D) They can be used in court as evidence in a lawsuit challenging an action as violating the National Environmental Policy Act. E) All federal, state, and local governmental actions require an environmental impact statement.

Business