In a(n) _______________ attack, the attacker poses as a trusted site and asks you to give them information that will give them access to your private financial identity.
Fill in the blank(s) with the appropriate word(s).
phishing
correct
You might also like to view...
In a Flat Catalog design-sometimes referred to as a(n) _______ design-all elementand attribute definitions have global scope.
Fill in the blank(s) with the appropriate word(s).
Which location type is used when the computer is connected in an untrusted public location such as an airport?
A. Domain network B. Public network C. Home network D. Work network
Under Windows XP, __________ memory does not count against the process’s 2 GB limit until it is __________ and actual physical pages are stored in memory and on the page file.
a. reserved/committed b. committed/reserved c. virtual/dynamically translated d. The premise of this question is false.
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?
A. LLTP B. LLTPRD C. AIX D. TCP/IPv6