Multiple Choice
These often arrive in the form of e-mail attachments that appear interesting to recipients, promising exciting pictures, screensavers, music, or software.
A) hacking
B) pretexting
C) phishing
D) Trojan horses
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: According to one typology of child pornographers,
Q23: Concerns about which offense led to the
Q24: This is software that purposefully damages, disables,
Q25: This is unsolicited e-mail advertising a product
Q26: This involves committing a network break-in by
Q28: Explain the concept of electronic monitoring and
Q29: Legal jurisdiction can be established by all
Q30: This term refers to methods used to
Q31: One key consequence the Internet has had
Q32: This is the primary criminal justice use