____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.?
A. ?List linking
B. ?Phishing
C. ?E-mail spoofing
D. ?419
Answer: A
Computer Science & Information Technology
You might also like to view...
A subclass of JFrame inherits getWidth() and getHeight() methods.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
_________ attacks include impersonating another user, altering messages in transit between client and server and altering information on a Web site.
A) ?Active ? B) ?Passive ? C) ?Shell ? D) ?Psuedo
Computer Science & Information Technology
How do sizing handles appear?
A) as small triangles B) as a dotted green outline C) as small dots or squares D) as hollow circles
Computer Science & Information Technology
The ________ Wizard restricts how data is entered into a field
Fill in the blank(s) with correct word
Computer Science & Information Technology