____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A. Spoofing
B. Phishing
C. Impersonating
D. Acting


Answer: B

Computer Science & Information Technology

You might also like to view...

The use of software that enables the physical hardware of a PC to be simulated is referred to as virtualization.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a(n) ________ system, each step is dependent on the previous step

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ system is a type of information system that performs analytical tasks traditionally done by a human.

A. fault-tolerant B. data warehousing C. data mining D. expert

Computer Science & Information Technology

When creating a clipping mask, the layer containing the imagery should be ____________________ the layer containing the shape.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology