Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A. spear phishing
B. phishing
C. pharming
D. Google phishing


Answer: C

Computer Science & Information Technology

You might also like to view...

The ________ thread should be used to perform all tasks that manipulate GUI components, because they are not thread safe.

a. event-handling b. event-dispatch c. GUI-handling d. None of the above.

Computer Science & Information Technology

What routing protocol is easiest to use for WAN links? What if there are multiple connections to the remote sites?

What will be an ideal response?

Computer Science & Information Technology

Which of these statements best defines scope?

a. Scope refers to the classes that have access to a variable. b. Scope determines whether a variable’s value can be altered. c. Scope is the portion of a program that can refer to an entity by its simple name. d. Scope allows the programmer to use a class without using its fully qualified name.

Computer Science & Information Technology

A customer is leveraging Amazon Simple Storage Service in eu-west-1 to store static content for a web-based property. The customer is storing objects using the Standard Storage class. Where are the customers objects replicated?

A. A single facility in eu-west-1 and a single facility in eu-central-1 B. A single facility in eu-west-1 and a single facility in us-east-1 C. Multiple facilities in eu-west-1 D. A single facility in eu-west-1

Computer Science & Information Technology