If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income, what type of attack are they using?

A. spoofing
B. URL hijacking
C. Web squatting
D. typo hijacking


Answer: B

Computer Science & Information Technology

You might also like to view...

Windows 7, Windows Vista, and Windows XP are examples of ________

A) operating systems B) application software programs C) Internet browsers D) utility programs

Computer Science & Information Technology

A quantity field would be best formatted as the ________ data type

Fill in the blank(s) with correct word

Computer Science & Information Technology

Why would you enforce referential integrity?

A) To determine which software to use Excel or Access B) To confirm error free data C) To avoid accidental deletion of macros D) So data cannot be entered into a related table until the data is entered in the primary table

Computer Science & Information Technology

Unless a page's textual content is intended to be printed and read offline, your pages' text should be easily scannable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology