Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS server in order to carry out URL redirection?

A. Pharming
B. Spoofing
C. Vishing
D. Phishing


Answer: B. Spoofing

Computer Science & Information Technology

You might also like to view...

By restricting access to the tables in Datasheet view, the integrity of the data and structure of the data is not at risk

Indicate whether the statement is true or false

Computer Science & Information Technology

Suppose that you are a computer virus writer; hence, you know that you need to store a copy of the code for your virus inside the virus itself. Moreover, suppose you know that a security administrator is also aware of this fact and will be using it to detect the presence of your virus in operating systems files, as described in the previous problem. Explain how you can hide the embedded copy of

your virus so that it is difficult for the security administrator to find it. What will be an ideal response?

Computer Science & Information Technology

?_________ are the layouts in which content is displayed side-by-side in a page and differs from those layouts that use floating elements or flexboxes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to two different rooms.   What kind of storage should you recommend to Reggie for this type of network?

A. Network-attached storage B. SSD hard drive C. Magnetic hard drive D. Cloud storage

Computer Science & Information Technology