The act of using the Internet via e-mail and fake Web pages to pose as someone else in order to get usernames and passwords is called:

a. Phishing
b. Spamming
c. DoS
d. Spoofing


Answer: a. Phishing

Computer Science & Information Technology

You might also like to view...

When you return an array from a method, the method returns __________.

a. a copy of the array b. a copy of the first element c. the reference of the array d. the length of the array

Computer Science & Information Technology

A presentation given to employees of a plant scheduled for closing is an example of a presentation given to prepare an audience

Indicate whether the statement is true or false

Computer Science & Information Technology

A programmer can choose to display the value of a variable using the ____ instruction while debugging a world.

A. more B. say C. print D. show

Computer Science & Information Technology

A trust relationship is a configured link that enables a domain to access resources in another domain, or a forest to access resources in another forest. A trust relationship provides such access to users without the need to create additional user accounts in the other forest or domain

Indicate whether the statement is true or false

Computer Science & Information Technology