____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

A. Identity theft
B. Spam
C. DoS attack
D. Phishing


Answer: A

Computer Science & Information Technology

You might also like to view...

Which statement is true?

a. Dividing two integers results in integer division. b. With integer division, any fractional part of the calculation is lost. c. With integer division, any fractional part of the calculation is truncated. d. All of the above.

Computer Science & Information Technology

In OpenOffice applications, a menu box displays settings and commands that, when selected, specific actions execute

Indicate whether the statement is true or false

Computer Science & Information Technology

____ refers to the amount of data that can be transferred (such as via a bus or over a certain type of networking medium) in a given time period.

A. Bandwidth B. Bluetooth C. Modulation D. Throughband

Computer Science & Information Technology

Which technology typically provides security isolation in infrastructure as a service (IaaS) cloud computing?

A. Application instance B. System image repository C. Virtual machines D. Operating systems

Computer Science & Information Technology