1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
6

Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following

types of attacks is this?A. PhishingB. SpoofingC. RansomwareD. E-mail poisoning
Computers and Technology
1 answer:
uysha [10]3 years ago
0 0

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
You might be interested in
Which of the following correctly stores 45 squared in the variable x?
timama [110]

Answer:

x = 45

x = x ** 2

6 0
3 years ago
write pseudocode to represent the logic of a program that allows the user to enter a value for one edge of a cube. The program c
PilotLPTM [1.2K]

Answer:

prompt("Enter a value for one edge of a cube")

Store user's value into edgeCube

area = 6 * (edgeCube * edgeCube)

volume = edgeCube * edgeCube * edgeCube

print("One side of the cube is: " + edgecube);

print("The area is: " + area)

print("The volume is: " + volume)

8 0
3 years ago
There are five identical closed boxes. one box contains $10,000, two boxes contain $1000 each, one box contains $1, and the last
sp2606 [1]
Mean means most and the most he can get is the 10000 and the 2 1000s and the 1 dollar so the mean is 12001.
6 0
3 years ago
CAN SOMEONE PLEASE write about the evolution of music IN PETAL FORM PLEASE I NEED IT DUE TMR PLEASE I GIVE 15 POINTS AND BRAINLY
vitfil [10]

Answer:

Music can evolve by the process of natural selection, the same way species evolve in the natural world. They found that the loops quickly evolved into music attributable, in part, to the evolution of aesthetically pleasing chords and rhythms.

4 0
3 years ago
Which type of computer graphic can be resized without affecting image quality or getting distorted?
BartSMP [9]
Vector graphics can be rescaled without losing quality and each property can be changed like the colour, shape and size. 

Even if an object in a vector large, it doesn't need a lot of memory. Hence, the file size of a vector graphic is often very small.


8 0
3 years ago
Other questions:
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • What is the decimal number 75 in binary and hexadecimal?
    8·1 answer
  • By placing the chorale melody in the highest voice and using a simple harmonization, bach made it easier for congregation member
    5·1 answer
  • MICR is an input or output devices
    5·1 answer
  • Match the elements of a web page with their descriptions?
    15·2 answers
  • What functions do these WLAN applications and tools perform on WLANs: airmonng, airodump-ng, aircrack-ng, and aireplay-ng
    10·1 answer
  • With _________, users will receive recommendations for items liked by similar users.
    9·1 answer
  • Discuss the core technologies and provide examples of where they exist in society. Discuss how the core technologies are part of
    14·1 answer
  • please help me to do this computer homework I beg you all please help me to get the answers please its important please ​
    12·1 answer
  • If a person communicates indirectly and attaches little value to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!