Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS server in order to carry out URL redirection?
A. Pharming
B. Spoofing
C. Vishing
D. Phishing
Answer: B. Spoofing
You might also like to view...
By restricting access to the tables in Datasheet view, the integrity of the data and structure of the data is not at risk
Indicate whether the statement is true or false
Suppose that you are a computer virus writer; hence, you know that you need to store a copy of the code for your virus inside the virus itself. Moreover, suppose you know that a security administrator is also aware of this fact and will be using it to detect the presence of your virus in operating systems files, as described in the previous problem. Explain how you can hide the embedded copy of
your virus so that it is difficult for the security administrator to find it. What will be an ideal response?
?_________ are the layouts in which content is displayed side-by-side in a page and differs from those layouts that use floating elements or flexboxes.
Fill in the blank(s) with the appropriate word(s).
Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to two different rooms. What kind of storage should you recommend to Reggie for this type of network?
A. Network-attached storage B. SSD hard drive C. Magnetic hard drive D. Cloud storage