____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A. Framing
B. Fishing
C. Pharming
D. Farming


Answer: C

Computer Science & Information Technology

You might also like to view...

The term for unwanted signal coupling from one permanent link to another is

a. near-end crosstalk. b. alien crosstalk. c. far-end crosstalk. d. None of these answers is correct.

Computer Science & Information Technology

Every constructor must be declared with no return type (not even void).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following loops supports two distinct forms of syntax?

A. while B. until C. loop D. None of the above

Computer Science & Information Technology

At the heart of any secure WLAN is ____.

A. traffic filtering B. protocol monitoring C. education and training D. strong encryption

Computer Science & Information Technology