Sara, a user, receives a call and the caller asks if Sara would be willing to answer a few marketing questions, and in return be placed in the drawing to win a trip to Hawaii. After Sara agrees, she is transferred to an automated service which states that some personal information needs to be collected to verify her full name, birthday, address, and email to be eligible for the Hawaii trip. After providing the details Sara is then solicited for banking preferences, general purchasing preferences, and debit card details. Which of the following BEST describes this type of attack?

A. A hoax
B. Pharming
C. Smurfing
D. Vishing


Answer: D. Vishing

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Python stores process information in sys.argv. 2) os.pipe is used to create files in Python. 3) Processes can communicate with signals. 4) os.kill sends a signal to a particular process.

Computer Science & Information Technology

Just as with a selection, the Boolean comparison that controls a while loop must compare same-type values.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A Microsoft ________ App is an app that will run on any Windows device

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a business letter, within the message, paragraphs are double-spaced with single-spacing between paragraphs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology