If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.?

A. ?e-mail bombing
B. ?spoofing
C. ?smurfing
D. ?firewalling


Answer: B

Computer Science & Information Technology

You might also like to view...

One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.

A. master key B. KDC C. public key D. end-to-end

Computer Science & Information Technology

An identifier can be any sequence of characters and integers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To quit Expression Web, click the Close Site command on the File menu.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The probability that a specific vulnerability within an organization will be attacked by a threat is known as __________.

A. impact B. likelihood C. uncertainty D. tolerance

Computer Science & Information Technology