Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A. spear phishing
B. phishing
C. pharming
D. Google phishing


Answer: C

Computer Science & Information Technology

You might also like to view...

Portable software is designed to run fromĀ  _____.

A. a hard disk B. a Web site C. memory D. a USB flash drive

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 15-1Tom is taking a class on computer graphics and how to use them. Tom has a TIFF file that is 950 KB. This file is too large, so he wants to make it smaller. In order to do this, Tom should ____.

A. go back and make the image less detailed B. save it in JPEG format with built-in compression C. there is no way to make file size smaller D. save it as a RAW file

Computer Science & Information Technology

List and describe two motivations attackers have to attack a network.

What will be an ideal response?

Computer Science & Information Technology

What is the sum of the first 100 consecutive integers starting with 1? It is possible to work this problem quickly without having to do repetitive sums. A very simple formula exists that will compute the sum of consecutive integers from 1 to n for any value of n. Can you discover the formula by simple reasoning and a little arithmetic

What will be an ideal response?

Computer Science & Information Technology