If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.?
A. ?e-mail bombing
B. ?spoofing
C. ?smurfing
D. ?firewalling
Answer: B
Computer Science & Information Technology
You might also like to view...
One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.
A. master key B. KDC C. public key D. end-to-end
Computer Science & Information Technology
An identifier can be any sequence of characters and integers.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
To quit Expression Web, click the Close Site command on the File menu.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The probability that a specific vulnerability within an organization will be attacked by a threat is known as __________.
A. impact B. likelihood C. uncertainty D. tolerance
Computer Science & Information Technology