________ can be used to visualize user-generated content on a site.
A) Crowdsourcing
B) Tag clouds
C) Phishing
D) Podcasts
E) Pharming
Question 2
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.
A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking