What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

A. Phishing
B. Dumpster diving
C. System crashing
D. Tailgating


Answer: A

Computer Science & Information Technology

You might also like to view...

What router interface is most commonly used to interconnect LANs in a campus network?

a. Serial b. Console port c. Ethernet d. ATM

Computer Science & Information Technology

Neither the Zoom tool nor the Hand tool affect the way a Flash graphic is displayed to the user.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The advanced filter tool can ________

A) search for unique records, only B) not filter multiple arrays C) filter a limit of 256 rows D) delete duplicate records

Computer Science & Information Technology

Land-grid arrays (LGAs)have two rows of pins that connect the chip to a circuit board.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology