The process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by pretending to be a reputable entity is a ________

A) denial of service attack B) phishing attack
C) Trojan horse attack D) botnet attack


B

Computer Science & Information Technology

You might also like to view...

Explain the difference between using Step and Repeat, and the Align panel.

What will be an ideal response?

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. Java source code that contains a class with an inner class, when compiled, will produce a separate .class file for the inner class. 2. An ArrayList object has a fixed size.

Computer Science & Information Technology

Using the Presentation Wizard is the only way to create a new presentation in Impress

Indicate whether the statement is true or false

Computer Science & Information Technology

All of the fields added to the form are from the Customer table.  These controls are called ____ controls because they are connected to a field in the database.

A. bound B. calculated C. unbound D. label

Computer Science & Information Technology