Attempts to collect personally identifiable information, credit card numbers, bank account numbers, and so forth is called ____.

A. trolling
B. phishing
C. scooping
D. marking


Answer: B

Computer Science & Information Technology

You might also like to view...

Create a relational schema for the Branch view of DreamHome based on the conceptual data model produced in Exercise 15.13 and compare your schema with the relations listed in Figure 16.5. Justify any differences found.

What will be an ideal response?

Computer Science & Information Technology

When you try to save a file, your computer gives you a warning that you do not have enough disk space. Which of the following upgrades target the warning?

A. adding more memory or RAM B. adding more disk space C. all of the above 3. True/False: Adding more

Computer Science & Information Technology

Where do you look in a packet captured by Wireshark if you want to determine the RTO?

A. Stream index B. Options C. Flags D. TCP Analysis Flags

Computer Science & Information Technology

In Jacksonville, a horrific thunderstorm rolled through the area. Afterward, Karl walked into his home office and smelled a strong burning odor. Which component is most likely causing the odor?

A) CPU fan B) CPU C) Motherboard D) Power supply

Computer Science & Information Technology