A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as

a. spear phishing.
b. pretexting.
c. keystroke logging.
d. logic bombing.


A

Computer Science & Information Technology

You might also like to view...

If a is a structure variable and p, a pointer, is a member of the structure, what will the following statement do?

``` cout << *a.p; ``` a. output the dereferenced value pointed to by p b. result in a compiler error c. output the address stored in p d. output the value stored in a e. None of these

Computer Science & Information Technology

In the Internet Explorer window, which of the following elements enables you to display a list of recently visited Web sites?

A) Refresh button B) Tab List button C) Stop button D) Recent Pages button

Computer Science & Information Technology

Which of the following best describes HIPAA administrative safeguards?

A. Retention, availability, and update requirements related to supporting documentation B. The use of technical security measures to protect ePHI data C. Standards for business associate contracts and other arrangement D. Documented policies and procedures for managing day-to-day operations and access to ePHI

Computer Science & Information Technology

Routers operate at the ____ layer of the OSI model.

A. Network B. Transport C. Data Link D. Physical

Computer Science & Information Technology