Multiple Choice
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
A) typosquatting
B) spamming
C) DoS attacks
D) identity theft
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q33: Like a computer virus, a computer worm
Q34: Computer crime is sometimes referred to as
Q35: Computer spyware includes any illegal act involving
Q36: Once installed, _ are designed to record
Q37: Writing a computer virus or other type
Q39: One emerging type of Trojan horse is
Q40: _ is a type of scam that
Q41: _ often find their victims online- for
Q42: A firewall is a security system that
Q43: Like a computer virus, a _ is