Short Answer
____________________ involves pretending-typically via phone or e-mail-to be a bank officer, potential employer, IT employee, or other trusted individual in order to get the potential victim to supply personal information.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q28: Numeric passwords are often called PINs . _
Q29: A(n) _ is an identification system that requires
Q30: Security software protects devices against malware and
Q31: A(n) _ is an alternate location equipped
Q32: One common way to deal with spam
Q34: _ devices can withstand being dropped or
Q35: Some worms are specifically written to take
Q36: You can order free credit reports online quickly
Q37: For increased security, _ (using two different
Q38: A(n) _ is a software program that