What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?
A. Phishing
B. Dumpster diving
C. System crashing
D. Tailgating
Answer: A
Computer Science & Information Technology
You might also like to view...
What router interface is most commonly used to interconnect LANs in a campus network?
a. Serial b. Console port c. Ethernet d. ATM
Computer Science & Information Technology
Neither the Zoom tool nor the Hand tool affect the way a Flash graphic is displayed to the user.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The advanced filter tool can ________
A) search for unique records, only B) not filter multiple arrays C) filter a limit of 256 rows D) delete duplicate records
Computer Science & Information Technology
Land-grid arrays (LGAs)have two rows of pins that connect the chip to a circuit board.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology