Which of the following is true of phishing?
A) It is the process of stealing personal data from a victim by convincing him to disclose information.
B) It is useful in monitoring the web traffic into and out of an unsecured computer network.
C) It involves the use of several thousand computers to launch malicious attacks that can cripple websites.
D) It uses small pieces of code inserted into a browser that track an Internet user's activity and transmit the data to third parties.
Correct Answer:
Verified
Q68: A(n)_ lists out and rates the vulnerabilities
Q69: Which of the following administrative security controls
Q70: _ refers to an attack in which
Q71: One way to identify a threat in
Q72: _ helps in determining the cause of
Q74: Which of the following authentication strategies is
Q75: Which of the following authentication strategies is
Q76: _ refers to an attempt to steal
Q77: Janet received an email that contained a
Q78: Which of the following technologies serves as
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents