_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.

a. Spoofing
b. Vishing
c. Phishing
d. Smishing


c. Phishing
Phishing is the act of fraudulently using email to try to get the recipient to reveal personal data. In a phishing scam, con artists send legitimate-looking emails urging the recipient to take action to avoid a negative consequence or to receive a reward. The requested action may involve clicking on a link to a Web site or opening an email attachment.

Computer Science & Information Technology

You might also like to view...

The communication protocol used to send and receive information across the internet is commonly called ________.

(a) COBOL. (b) TCP/IP. (c) ARPA. (d) ARPAnet.

Computer Science & Information Technology

You can use File History to recover a previous version of a file

Indicate whether the statement is true or false

Computer Science & Information Technology

Notes have reply boxes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following statements about unary expressions is true?

A. The sizeof operator requires a parenthetical expression as its operand. B. The unary plus operator does not change the value of the expression. C. The unary minus operator subtracts one from the operand value. D. The unary minus operator has a side effect.

Computer Science & Information Technology