A ____ attack is when hackers intercept information sent out over networks.

A. phishing
B. pharming
C. sniffing
D. spamming


Answer: C

Computer Science & Information Technology

You might also like to view...

The assignment operator is simply a question mark (?).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

E-mails are completely private.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Trustis the composite of:

A. availability B. acceptability C. accessibility D. integrity, secrecy, and privacy E. A, B, and C

Computer Science & Information Technology

Which of the following graphically depicts the movement of information within a system?

A. Site survey diagram B. Dataflow diagram C. Architectural diagram D. Network diagram

Computer Science & Information Technology