Which type of attack is a form of social engineering?

A. Denial of Service
B. Smurf attack
C. Phishing
D. Zombie


Answer: C

Computer Science & Information Technology

You might also like to view...

The ________ feature guesses at what values you want entered based on previous column entries

Fill in the blank(s) with correct word

Computer Science & Information Technology

Most Web developers use ____ to enclose the filename for the background image as the value of the background-image property.

A. single quotation marks B. double quotation marks C. ampersands D. none of the above

Computer Science & Information Technology

The term en banc refers to all members of an appellate court hearing an argument rather than just the required quorum

Indicate whether the statement is true or false.

Computer Science & Information Technology

A ____ topology connects each node to a central device, such as a hub or switch.

A. bus B. triangle C. star D. ring

Computer Science & Information Technology