1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
2 years ago
8

A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information

or grant unauthorized access to protected networks. A. direct mail B. instant messaging C. phishing D. spam E. mass mail
Computers and Technology
1 answer:
d1i1m1o1n [39]2 years ago
5 0

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
You might be interested in
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equ
Arlecino [84]
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equation?

=(24+75)/(6*3)
=99/18
= 5.5
18)99.0.
90.0
9.0

D. 5.5



6 0
3 years ago
A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
Vanyuwa [196]

Answer:

Three.

Explanation:

5 0
3 years ago
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
3 years ago
What is the easiest way to create a diverse set of cover pages?<br><br> Word 2016
Sindrei [870]

Answer:

using the cover page gallery

Explanation:

This is certainly the easiest way. And you just need to add this as first page, set the borders, pagination, headers and footers from second page, and avoiding the first page as it is the cover page as well as customize the various section of the cover page design you choose.

Inserting a blank page will require a lot of effort.

Inserting pictures will not  result into a complete and a meaningful cover page.

Same is the case if you insert shapes.

hope it helps :)

3 0
3 years ago
Read 2 more answers
Hy <br> Anyone from kerala?
Lera25 [3.4K]

Answer:

i dont know

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
    6·1 answer
  • Cell phone producers charge a _____, which consumers pay to buy the phones. profit production cost price
    12·1 answer
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • Physical activity such as sports or even a brisk walk can help reduce
    7·2 answers
  • Which best describes a hybrid drive?
    11·1 answer
  • One blog may have a greater social influence than another when it has_______?
    12·2 answers
  • What is the other name of the horizontal column graph
    9·1 answer
  • Question<br> 1. Who was the first to use an abacus
    6·1 answer
  • Zoe wants to use an image file that will allow her to preserve all of the original
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!