Whereas phishing involves sending millions of generic e-mail messages to users, which type of similar attack targets only specific users?
A. whaling
B. vishing
C. spear phishing
D. pharming
Answer: C
You might also like to view...
Explain the advantage of copy-on-write region copying for UNIX, where a call to fork is typically followed by a call to exec. What should happen if a region that has been copied using copy-on- write is itself copied?
What will be an ideal response?
Design the HARDWARE INVENTORY LISTING, showing the software available in each room at each campus. The CAMPUS field should be the CAMPUS DESCRIPTION, not the code representing the campus.
What will be an ideal response?
The ____________________ tool creates a form that looks just like a datasheet.
Fill in the blank(s) with the appropriate word(s).
Cite a reason that an organization might want two or more firewalls on a single network
What will be an ideal response?