A ____ attack is when hackers intercept information sent out over networks.
A. phishing
B. pharming
C. sniffing
D. spamming
Answer: C
Computer Science & Information Technology
You might also like to view...
The assignment operator is simply a question mark (?).
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
E-mails are completely private.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Trustis the composite of:
A. availability B. acceptability C. accessibility D. integrity, secrecy, and privacy E. A, B, and C
Computer Science & Information Technology
Which of the following graphically depicts the movement of information within a system?
A. Site survey diagram B. Dataflow diagram C. Architectural diagram D. Network diagram
Computer Science & Information Technology