Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites.
A. typosquatting
B. spamming
C. decrypting
D. encoding
Answer: A
You might also like to view...
Discuss the aim of the personnel security process.
What will be an ideal response?
The clusters that make up an MS-DOS file are chained together through the __________.
a. shell b. directory c. file allocation table d. device driver
Computers don’t understand what we ________, only what we ________.
Fill in the blank(s) with the appropriate word(s).
Which of the following is TRUE with respect to sharing files on SkyDrive?
A) To use Web Apps to share a document, you must download and install the software. B) Regardless of how a file originated, you can share it only through Web Apps. C) As you share a document, you can indicate whether the recipients can edit the document, or simply view it. D) Files that you share are limited to those created in Microsoft Office or Web Apps.