Multiple Choice
Which of the following best describes spear-phishing?
A) The phisher sends a survey to the employees of several organizations to obtain details of the configuration of their computing devices.
B) The phisher sends a voice mail message to a number of people to call a phone number or access a Web site.
C) The phisher sends legitimate-looking text messages through his or her phone to advertise a certain organization.
D) The phisher sends fraudulent emails to a certain organization's employees disguising them as mails from high-level executives from within the organization.
Correct Answer:

Verified
Correct Answer:
Verified
Q45: Which phase of an advanced persistent threat
Q46: Identify the mode of message transmission used
Q47: _ occurs when the personal information of
Q48: Which of the following defines a rootkit?<br>A)It
Q49: Ricky,an employee of Gycl Inc.,has unknowingly shared
Q51: An industrial spy hacks computers or Web
Q52: _ is a program in which malicious
Q53: What are the steps involved in a
Q54: David,a software engineer,was creating a report using
Q55: Which intrusion detection system (IDS)contains information about