Multiple Choice
A hacker sends an e-mail impersonating technical support to two hundred employees of a company. Four employees respond with their password, thereby allowing the hacker to access the company's internal networks. Which technique is being discussed here?
A) Sniffing
B) Crawling
C) Phishing
D) Wartrapping
Correct Answer:

Verified
Correct Answer:
Verified
Q23: Why is it that Internet users' information
Q24: Which of the following is NOT a
Q25: Which of the following is the first
Q26: Generally, the best way to prevent fraud
Q27: Which of the following is the last
Q29: Which of the following is NOT a
Q30: Which of the following is NOT an
Q31: Which of the following are self-contained programs
Q32: Which of the following examples illustrates sniffing?<br>A)
Q33: An IDS is used to:<br>A) Write computer