1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
11

An example of phishing is: Select one: a. flooding a web server with thousands of requests for service. b. setting up a fake med

ical website that asks users for confidential information. c. a program that records the keystrokes on a computer. d. sending bulk email that asks for financial aid under a false pretext. e. malware that displays annoying pop-up messages.
Computers and Technology
2 answers:
tigry1 [53]3 years ago
7 0

Answer:

Option(b) is the correct answer to the given question.

Explanation:

The main objective of the Phishing to posing as a legitimate entity and trick the individuals to sharing her confidential information like information of banking details such as credit card number  and passwords etc.

Phishing is done with the help of email, telephone or etc. Sometime phishing is done by the web page and stolen the website password. Phishing provides financial loss to the individual as well as the organization.

Except for option(b) all the options are not examples of Phishing that's why they are incorrect Options.

omeli [17]3 years ago
4 0

Answer:

option b

Explanation:

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

You might be interested in
Briefly explain what is net neutrality and why is it important today
ICE Princess25 [194]

Net neutrality also means that ISPs can't charge users access fees for particular websites. ... The goal of net neutrality is to ensure that businesses can compete freely on the internet without having to pay gatekeeper tolls. Without it consumers would look more like advertising segments than an open marketplace.

Credits: thestreet.com

6 0
3 years ago
Monica needs to work on a document where she has to highlight topics in bold and add emphasis to some words in a paragraph using
sp2606 [1]
<span>Monica needs to work on a document where she has to highlight topics in bold and add emphasis to some words in a paragraph using italics. These keys will allow her to highlight and italicize the words : 
</span>Ctrl+B combination of keys will allow Monica to highlight text in bold. The Ctrl+I combination of keys will allow her to italicize text. 
Ctrl+B+I  combination of keys will allow her to make it bold and italicize at the same time.
7 0
3 years ago
Prehistoric music was often written down on clay tablets
Fudgin [204]

It is false. Just took a quiz with this question. It is 100% FALSE because I put true and got it wrong.

4 0
3 years ago
A type of printer is used to price model and shape is called
balandron [24]

Either a 3d,2d printer, or a price label gun

7 0
4 years ago
Which of the following are safety guidelines when socializing online?
DochEvi [55]

Answer:

All of them execpt five and three.

Explanation:

It is okay to have social media and receive messages.

3 0
2 years ago
Other questions:
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used? (A.)c
    5·1 answer
  • Write the definition of a class Clock. The class has no constructors and three instance variables. One is of type int called hou
    13·1 answer
  • If you need to set up direct deposit, which information from your check would you likely need?
    7·2 answers
  • Create a Trip class. Include as data members destination, distance traveled, total cost of gasoline, and number of gallons consu
    14·1 answer
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • Name the steps to insert a cover page.
    14·1 answer
  • You are going to visit a national park, and have never been there before. You are using a map to try and make the distance trave
    11·1 answer
  • ______ controls are information security safeguards that focus on the application of modern technologies, systems, and processes
    12·1 answer
  • Who knows my cousin better?
    14·1 answer
  • View the contents of the /root/.bash_profile file. type cat /root/.bash_profile at the prompt to answer the question. what is th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!