Author Question: ________ is a technique for intercepting computer communications. A) Spoofing B) Phishing C) ... (Read 187 times)

folubunmi

  • Hero Member
  • *****
  • Posts: 524
________ is a technique for intercepting computer communications.
 
  A) Spoofing
  B) Phishing
  C) Pretexting
  D) Sniffing

Question 2

Which of the following is a synonym for phishing?
 
  A) pretexting
  B) email spoofing
  C) hardening
  D) system hacking



dellikani2015

  • Sr. Member
  • ****
  • Posts: 332
Answer to Question 1

D

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Calcitonin is a naturally occurring hormone. In women who are at least 5 years beyond menopause, it slows bone loss and increases spinal bone density.

Did you know?

Certain topical medications such as clotrimazole and betamethasone are not approved for use in children younger than 12 years of age. They must be used very cautiously, as directed by a doctor, to treat any child. Children have a much greater response to topical steroid medications.

Did you know?

Normal urine is sterile. It contains fluids, salts, and waste products. It is free of bacteria, viruses, and fungi.

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

Did you know?

The Centers for Disease Control and Prevention (CDC) was originally known as the Communicable Disease Center, which was formed to fight malaria. It was originally headquartered in Atlanta, Georgia, since the Southern states faced the worst threat from malaria.

For a complete list of videos, visit our video library