Instead of using an e-mail message to steal information from a user, this technique uses the telephone to request users to submit confidential information when prompted to do so. What type of computer fraud is this?

a. Spoofing
b. Phishing
c. Brute force attack
d. Vishing


d. Vishing

Criminal Justice

You might also like to view...

"Shell companies" are used in money laundering schemes where these businesses act as a legitimate front or cover-up for an illegal business

A. True B. False

Criminal Justice

Discuss the parameters of Miranda

What will be an ideal response?

Criminal Justice

The branch of the law that defines crimes and their punishment is known as ___________

Fill in the blank(s) with correct word

Criminal Justice

Consistent with the Fourth Amendment, public school children may possess

A) the same level of privacy as anyone else because the Fourth Amendment does not discriminate against children in its wording. B) a reduced expectation of privacy only where they play sports and shower together in a communal shower. C) a reduced expectation of privacy and can be subjected to drug testing where the parents have given their consent. D) a reduced expectation of privacy and students can be subjected to drug testing only where there has been proven individual suspicion of rule-breaking by an individual student. E) the same level of privacy as has traditionally been recognized for adult men and women.

Criminal Justice