____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.?

A. ?List linking
B. ?Phishing
C. ?E-mail spoofing
D. ?419


Answer: A

Computer Science & Information Technology

You might also like to view...

A subclass of JFrame inherits getWidth() and getHeight() methods.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_________ attacks include impersonating another user, altering messages in transit between client and server and altering information on a Web site.

A) ?Active ? B) ?Passive ? C) ?Shell ? D) ?Psuedo

Computer Science & Information Technology

How do sizing handles appear?

A) as small triangles B) as a dotted green outline C) as small dots or squares D) as hollow circles

Computer Science & Information Technology

The ________ Wizard restricts how data is entered into a field

Fill in the blank(s) with correct word

Computer Science & Information Technology