1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
3 years ago
11

Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c

ontained a link to a "test site" and a request to log in with normal user credentials. You never sent it, and on examination, the supposed test site is a phishing scam. Just what variant of phishing is this?
Spear phishing
Vishing
Pharming
Whaling
Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
6 0

Answer:

The correct answer is A.

Explanation:

Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.

Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.

The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.

I hope this answer helps.

You might be interested in
Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is
Harlamova29_29 [7]

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

6 0
3 years ago
Brian drives a car that uses voice commands for navigation. Which field did researchers use to develop a car-based AI that under
pickupchik [31]

Answer:

A, Computer Engineering

4 0
3 years ago
The web server software used has a significant impact on how a web site's web pages look on a user's computer.
soldi70 [24.7K]
False. Apache (which serves about 63% of the web pages) just serves the files. How it looks is a combination of the HTML and CSS that the site uses.
6 0
3 years ago
How will wireless information appliances and services affect the business use of the Internet and the Web? Explain.
Paraphin [41]

Answer:

wireless information appliances and services affect the business use of the internet and the web in a positive way. Wireless information appliances and services affect the business use of the web and internet by allowing internet pretty much anywhere. Now days devices like cell phones can access almost everything a regular computer can access. The use of wireless information allows businesses to stay in constant contact with customers, employees, and suppliers.

3 0
2 years ago
Which of these can be used as a smartphone with the power of a laptop?
sashaice [31]
I would go with A) Tablet because that's basically a bigger phone and mobile cmp combined, its not D) because that's a synonym for a smartphone and not C) because paper and pencil is not like a smartphone, and not B) because that's like reading online books.
4 0
2 years ago
Read 2 more answers
Other questions:
  • Very large and very small numbers are easier to write in scientific notation. For example, the number, 0.000000728 would be writ
    7·1 answer
  • What is the final step used when designing an algorithm?
    14·1 answer
  • Ethan wants to change the font in his document. He should _____.
    8·2 answers
  • Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically
    14·1 answer
  • Using the simple alphabet code below, you will decode and encode the message. Write the Full
    6·1 answer
  • Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be,
    12·1 answer
  • What is the setting an alarm clock output??
    10·1 answer
  • What are general purpose computer and special purpose computer?​
    10·2 answers
  • Which attributes are indicators that a website is reliable? Check all that apply is up to date explains sources of data is an ed
    10·1 answer
  • How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!