Which type of social engineering attack attempts to discover personal information through the use of email?
A. email surfing
B. footprinting
C. spamming
D. phishing
Answer: D
Computer Science & Information Technology
You might also like to view...
A file created by Microsoft Word is usually called a ____.
A. document B. spreadsheet C. slide show D. presentation
Computer Science & Information Technology
The part of the Access window that groups the commands for performing related database tasks on tabs is the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
During document editing, use the Save As option and rename the file in order to keep the original unchanged
Indicate whether the statement is true or false
Computer Science & Information Technology
_________________________ allows you automatically to modify values in a what-if area of a worksheet based on a goal that you have for another cell in the worksheet.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology