Multiple Choice
Kenneth is working on a confidential government project. Daniel, a coworker, and he are the only two members who are authorized to access the project's information system. Kenneth, while away on a business trip, receives an email from Daniel asking for his login credentials as Daniel was unable to access the system. Kenneth finds the request unusual, and calls Daniel to confirm if the email was sent by him. Kenneth deletes the email when he learns that Daniel had not sent it. This scenario is an example of attempted ________.
A) hacking
B) phishing
C) sniffing
D) wardriving
Correct Answer:

Verified
Correct Answer:
Verified
Q3: Natural disasters present the largest risk for
Q42: Most emails and IMs are protected by
Q57: A computer crime is committed if an
Q64: Define threat, vulnerability, safeguard, and target.
Q75: Describe six malware safeguards.
Q79: Sniffing occurs when an intruder uses another
Q81: Which of the following is a personal
Q84: Unauthorized data disclosure is possible due to
Q85: Which of the following statements is true
Q87: A _ is a person or an