Multiple Choice
An example of phishing is:
A) flooding a web server with thousands of requests for service.
B) setting up a fake medical website that asks users for confidential information.
C) a program that records the keystrokes on a computer.
D) sending bulk email that asks for financial aid under a false pretext.
E) malware that displays annoying pop-up messages.
Correct Answer:

Verified
Correct Answer:
Verified
Q4: Currently, the protocols used for secure information
Q5: NAT conceals the IP addresses of the
Q6: The Gramm-Leach-Bliley Act:<br>A) requires financial institutions to
Q7: According to IT security experts, mobile devices
Q8: _ identify the access points in a
Q10: Zeus is an example of a Trojan
Q12: To secure mobile devices, a company will
Q13: _ controls ensure that valuable business data
Q14: Your company, an online clothing store, has
Q23: Most computer viruses deliver a:<br>A)worm.<br>B)Trojan horse.<br>C)driveby download.<br>D)keylogger.<br>E)payload.