Author Question: ________ is a technique for intercepting computer communications. A) Spoofing B) Phishing C) ... (Read 167 times)

folubunmi

  • Hero Member
  • *****
  • Posts: 524
________ is a technique for intercepting computer communications.
 
  A) Spoofing
  B) Phishing
  C) Pretexting
  D) Sniffing

Question 2

Which of the following is a synonym for phishing?
 
  A) pretexting
  B) email spoofing
  C) hardening
  D) system hacking



dellikani2015

  • Sr. Member
  • ****
  • Posts: 332
Answer to Question 1

D

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Prostaglandins were first isolated from human semen in Sweden in the 1930s. They were so named because the researcher thought that they came from the prostate gland. In fact, prostaglandins exist and are synthesized in almost every cell of the body.

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

Did you know?

HIV testing reach is still limited. An estimated 40% of people with HIV (more than 14 million) remain undiagnosed and do not know their infection status.

Did you know?

Never take aspirin without food because it is likely to irritate your stomach. Never give aspirin to children under age 12. Overdoses of aspirin have the potential to cause deafness.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

For a complete list of videos, visit our video library