A targeted email attack sent to Sara, the company's Chief Executive Officer (CEO), is known as which of the following?
A. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving
Answer: A. Whaling
Computer Science & Information Technology
You might also like to view...
The line from the actor to the use case is called a(n) _____.
A. association B. aggregation C. lifeline D. observation
Computer Science & Information Technology
The argument names in the header line of a function are known as ____.
A. arguments B. parameters C. actual arguments D. actual parameters
Computer Science & Information Technology
Enables you to see exactly what the report will look like when it is printed.
What will be an ideal response?
Computer Science & Information Technology
A string that also includes a conversion control sequence is termed a literal string.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology