Which type of social engineering attack attempts to discover personal information through the use of email?

A. email surfing
B. footprinting
C. spamming
D. phishing


Answer: D

Computer Science & Information Technology

You might also like to view...

A file created by Microsoft Word is usually called a ____.

A. document B. spreadsheet C. slide show D. presentation

Computer Science & Information Technology

The part of the Access window that groups the commands for performing related database tasks on tabs is the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

During document editing, use the Save As option and rename the file in order to keep the original unchanged

Indicate whether the statement is true or false

Computer Science & Information Technology

_________________________ allows you automatically to modify values in a what-if area of a worksheet based on a goal that you have for another cell in the worksheet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology