Multiple Choice
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?
A) mining
B) phishing
C) hunting
D) doxing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q26: What two types of agents are used
Q27: What two options below are IDS implementations
Q28: Botnets often make use of what chat
Q29: In ACL statements,the any keyword is equivalent
Q30: A SOHO wireless router typically acts as
Q32: What kind of attack involves a flood
Q33: Programs that run independently and travel between
Q34: Which two viruses below are examples of
Q35: Matching<br>Match each correct item with the statement
Q36: Matching<br>Match each correct item with the statement