Multiple Choice
Which of the following is true of phishing?
A) It involves sending fraudulent e-mails that seem to come from legitimate sources.
B) It increases the speed of a system by reading universal product codes.
C) It monitors and records keystrokes and can be software or hardware devices.
D) It attempts to gain access to a network by posing as an authorized user.
Correct Answer:

Verified
Correct Answer:
Verified
Q15: If a drive in a redundant array
Q98: A distributed denial-of-service (DDoS)attack involves hundreds of
Q99: What is an intrusion detection system (IDS)?
Q100: A _ threat is a security threat
Q101: What are the actions that a firewall
Q102: How does a worm disrupt computing services?
Q104: Keystroke loggers can be used for malicious
Q105: What is data encryption?
Q106: In nonbiometric security measure,a _ is a
Q108: In physical security measures,using _ is an