1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
4 years ago
11

An example of phishing is: Select one: a. flooding a web server with thousands of requests for service. b. setting up a fake med

ical website that asks users for confidential information. c. a program that records the keystrokes on a computer. d. sending bulk email that asks for financial aid under a false pretext. e. malware that displays annoying pop-up messages.
Computers and Technology
2 answers:
tigry1 [53]4 years ago
7 0

Answer:

Option(b) is the correct answer to the given question.

Explanation:

The main objective of the Phishing to posing as a legitimate entity and trick the individuals to sharing her confidential information like information of banking details such as credit card number  and passwords etc.

Phishing is done with the help of email, telephone or etc. Sometime phishing is done by the web page and stolen the website password. Phishing provides financial loss to the individual as well as the organization.

Except for option(b) all the options are not examples of Phishing that's why they are incorrect Options.

omeli [17]4 years ago
4 0

Answer:

option b

Explanation:

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

You might be interested in
How can you logout your account and do not want to have this anymore
hram777 [196]

Answer:

Just Click Log out!

Explanation:

Its Simple, really! I promise its real

5 0
4 years ago
Read 2 more answers
On laptops with a smart card reader installed, where is the smart card reader usually located?
muminat

On laptops with a smart card reader installed, where is the smart card reader usually located Under the palm rest

<u>Explanation:</u>

A smart card reader is a design that can scan a card with some kind of barcoding or magnetic strip in it. Some Palmrest construction holds the smart card reader and ribbon cable junction board. Palm rest is frequently placed at the front of your laptop.

Smart card readers are commonly at both ends of the palm rest. It can simply be found on with USB and HDMI ports. Now Palm rest with fingerprint reader, smart card reader, and speaker removal are available.

<u />

<u />

4 0
4 years ago
Write the code to call a CSS file named "exam.css".
katen-ka-za [31]

Answer:

 <link rel="stylesheet" href="exam.css">

Explanation:

href is the file name assuming its in the same path

also get an extension called grepper, it helps debug a lot quicker

7 0
2 years ago
Read 2 more answers
So I'm a teen computer programmer, and I've built a couple of projects, but I'm looking for an idea to make me big money. So fel
Juliette [100K]
I hate lag and glitch and so many adds
5 0
3 years ago
What educational site could I make a screen capture tutorial on? I need ideas for a school project.
snow_tiger [21]

You Need Software To Screen Capture

The Software You can use is OBS its free and there are watermarks

4 0
3 years ago
Other questions:
  • You create hidden form fields with the ____ element.
    9·1 answer
  • is family mobile and boost mobile the same? if not whats the difference? (btw this is a random question)
    12·2 answers
  • Suppose company A wants to develop a program that duplicates the functionality of a programm by company B. Describe how company
    8·1 answer
  • Hey hope you are having a great day. Please subscribe to me on You tube at (Resurgentz). :)
    13·1 answer
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • Which act will the person be punished by trying to obtain personal information employees illegally?
    11·1 answer
  • What are the different types of firewalls? Which one is best?
    5·1 answer
  • 1. Empty tags do not have ___________.
    14·1 answer
  • Windows 8 has a built-in antivirus program called
    10·1 answer
  • Write a static method named isSorted that takes an array of real numbers as a parameter and that returns true if the list is in
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!