A targeted email attack sent to Sara, the company's Chief Executive Officer (CEO), is known as which of the following?

A. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving


Answer: A. Whaling

Computer Science & Information Technology

You might also like to view...

The line from the actor to the use case is called a(n) _____.

A. association B. aggregation C. lifeline D. observation

Computer Science & Information Technology

The argument names in the header line of a function are known as ____.

A. arguments B. parameters C. actual arguments D. actual parameters

Computer Science & Information Technology

Enables you to see exactly what the report will look like when it is printed.

What will be an ideal response?

Computer Science & Information Technology

A string that also includes a conversion control sequence is termed a literal string.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology