Multiple Choice
What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?
A) pharming
B) phishing
C) phishing expedition
D) spear phishing
Correct Answer:

Verified
Correct Answer:
Verified
Q9: Pirated software is software that is manufactured
Q10: Through social engineering, hackers use their social
Q20: Counterfeit software is the unauthorized use, duplication,
Q103: Information management examines the organizational resource of
Q112: What is an Internet monitoring technique that
Q113: What is a form of social engineering
Q115: Jackie is the head teller at ABC
Q119: What is an act or object that
Q120: What is competitive click-fraud?<br>A)the electronic defacing of
Q121: Which policy details the extent to which