Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites.

A. typosquatting
B. spamming
C. decrypting
D. encoding


Answer: A

Computer Science & Information Technology

You might also like to view...

Discuss the aim of the personnel security process.

What will be an ideal response?

Computer Science & Information Technology

The clusters that make up an MS-DOS file are chained together through the __________.

a. shell b. directory c. file allocation table d. device driver

Computer Science & Information Technology

Computers don’t understand what we ________, only what we ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is TRUE with respect to sharing files on SkyDrive?

A) To use Web Apps to share a document, you must download and install the software. B) Regardless of how a file originated, you can share it only through Web Apps. C) As you share a document, you can indicate whether the recipients can edit the document, or simply view it. D) Files that you share are limited to those created in Microsoft Office or Web Apps.

Computer Science & Information Technology