Multiple Choice
Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug sends email messages, which look legitimate, to his friends and obtains confidential information-such as credit card details, security numbers, and so on-from them. This is an example of _____.
A) phishing
B) piggybacking
C) war driving
D) social media hacking
Correct Answer:

Verified
Correct Answer:
Verified
Q5: Helen is the owner of a vintage
Q6: One of the most important components of
Q7: Data on Web sites are safe from
Q8: _ typically begins with online harassment, such
Q9: Collecting in-depth information about an individual is
Q11: According to the FBI, organized crime
Q12: A _ is a software program that
Q13: _ is the use of an email
Q14: _ occurs when phishing emails are targeted
Q15: _ refers to the act of breaking