A targeted email attack sent to Sara, the company's Chief Exective Officer (CEO), is known as which of the following?

A. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving


Answer: A. Whaling

Computer Science & Information Technology

You might also like to view...

The ____ for a purchase marks the start of the secure procurement process.

A. informal justification B. formal justification C. informal resolution D. formal resolution

Computer Science & Information Technology

A JRadioButton is different from a JCheckBox in that .

a. a JRadioButton is a subclass of JToggleButton, JCheckBox is not. b. normally several JRadioButtons are grouped together and are mutually exclusive. c. a JRadioButton is a type of button, JCheckBox is not. d. a JRadioButton is a state button, JCheckBox is not.

Computer Science & Information Technology

What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?

A. OTG B. COPE C. OTA D. VDI

Computer Science & Information Technology

Using the Style button, the ____ style sets a height-to-width ratio using decimal values.

A. Fixed Ratio B. Proportional C. Normal D. Refine Edge

Computer Science & Information Technology