Short Answer
____________________ often find their victims online- for instance, someone in a chat room who makes a comment or has a screen name that they do not like.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q36: Once installed, _ are designed to record
Q37: Writing a computer virus or other type
Q38: Phishing schemes may use a technique called
Q39: One emerging type of Trojan horse is
Q40: _ is a type of scam that
Q42: A firewall is a security system that
Q43: Like a computer virus, a _ is
Q44: Phishing schemes use legitimate-looking e-mails to trick
Q45: Denial of service attacks are usually of
Q46: _, the most commonly used type of