Multiple Choice
________ is a technique for intercepting computer communications.
A) Spoofing
B) Hacking
C) Pretexting
D) Phishing
E) Sniffing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q34: Fingerprints and facial features are used to
Q35: Care must be taken when terminating employees
Q36: Phishing is usually initiated via a(n) _.
Q37: What is pretexting?
Q38: A security incident reporting plan should _
Q40: Organizations should protect sensitive data by storing
Q41: The sources of security problems are human
Q42: PIPEDA stands for<br>A) Personal Information Protection and
Q43: What are the three general sources of
Q44: Organizations should store at least some of