A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

A. mail fraud
B. heuristics
C. ransoming
D. social engineering


Answer: D

Computer Science & Information Technology

You might also like to view...

FDDI operates at

a. 4 Mbps b. 10 Mbps c. 16 Mbps d. 100 Mbps

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Under MS-DOS, IO.SYS is responsible for directory management. 2. When a disk file is first opened, IO.SYS calls MSDOS.SYS to read the directory. 3. Under MS-DOS, IO.SYS is responsible for allocating space on disk. 4. Under MS-DOS, the BIOS contains an entry for each cluster on the disk.

Computer Science & Information Technology

The Surface Pro is built with a more traditional ________ hardware that lets it perform like a traditional PC

A) Intel chip B) operating system C) ARM chip D) Windows Phone chip

Computer Science & Information Technology

A(n) ________ uses a colon to separate the beginning and ending cells

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology