Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.
A. spear phishing
B. phishing
C. pharming
D. Google phishing
Answer: C
You might also like to view...
Portable software is designed to run fromĀ _____.
A. a hard disk B. a Web site C. memory D. a USB flash drive
Case-Based Critical Thinking QuestionsCase 15-1Tom is taking a class on computer graphics and how to use them. Tom has a TIFF file that is 950 KB. This file is too large, so he wants to make it smaller. In order to do this, Tom should ____.
A. go back and make the image less detailed B. save it in JPEG format with built-in compression C. there is no way to make file size smaller D. save it as a RAW file
List and describe two motivations attackers have to attack a network.
What will be an ideal response?
What is the sum of the first 100 consecutive integers starting with 1? It is possible to work this problem quickly without having to do repetitive sums. A very simple formula exists that will compute the sum of consecutive integers from 1 to n for any value of n. Can you discover the formula by simple reasoning and a little arithmetic
What will be an ideal response?