Short Answer
Using e-mail fraudulently to try to get the recipient to reveal personal data is called ____________________.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q36: State the purpose of an IT security
Q38: The Computer Fraud and Abuse Act addresses
Q40: Unlike a computer worm, which requires users
Q41: Rootkits are designed so cleverly that it
Q42: _ has made a strong commitment to
Q45: A(n) _ is a program in which
Q46: A security policy details exactly what needs
Q47: A _ attack keeps the target so
Q48: Rootkit is a set of programs that
Q71: People who use illegal means to obtain