1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
8

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed

by hackers to collect information from people who make the same typo. What kind of attack is this?A. PhishingB. TailgatingC. BaitingD. Quid pro quo
Computers and Technology
1 answer:
Thepotemich [5.8K]3 years ago
3 0

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

You might be interested in
CORRECT ANSWER GETS BRAINLIEST
guajiro [1.7K]

I saw that all of them are correct. In 1905, the Wright Brothers flew their plane for 39.5 minutes. In 1969, Neil Armstrong landed on the moon. And the Wright brothers went throughout the U.S and Europe to demonstrate their plane. I hope this helps.

7 0
3 years ago
Read 2 more answers
Why was the term personal computer created?
tresset_1 [31]
It was created to show the difference between computers that were owned by companies (at one point they were so large and so expensive that only big groups could afford and store them), and the era when computers became small enough for individuals to be able to fit them in their own homes, and also afford them. The era of the Personal Computer (PC) was a huge changing point in history because it brought a lot of power and connectivity into people's homes that hadn't been available before.
3 0
3 years ago
What is the difference between HTML and XML?
Luba_88 [7]

Explanation:

HTML displays data and describe the structure of a webpage while XML stores and transfers data.

7 0
2 years ago
Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 1024-byte 4-way set as
Cerrena [4.2K]

Answer:

The answer is The Cache Sets (S) = 32, Tag bits (t)=24, Set index bits(s) = 5 and Block offset bits (b) = 3

Explanation:

Solution

Given Data:

Physical address = 32 bit (memory address)

Cache size = 1024 bytes

Block size = 8 bytes

Now

It is a 4 way set associative mapping, so the set size becomes 4 blocks.

Thus

Number of blocks = cache size/block size

=1024/8

=128

The number of blocks = 128

=2^7

The number of sets = No of blocks/set size

=128/4

= 32

Hence the number of sets = 32

←Block ←number→

Tag → Set number→Block offset

←32 bit→

Now, =

The block offset = Log₂ (block size)

=Log₂⁸ = Log₂^2^3 =3

Then

Set number pc nothing but set index number

Set number = Log₂ (sets) = log₂³² =5

The remaining bits are tag bits.

Thus

Tag bits = Memory -Address Bits- (Block offset bits + set number bits)

= 32 - (3+5)

=32-8

=24

So,

Tag bits = 24

Therefore

The Cache Sets = 32

Tag bits =24

Set index bits = 5

Block offset bits = 3

Note: ←32 bits→

Tag 24 → Set index  5→Block offset 3

7 0
3 years ago
What is the maximum number of colors that should be used on a slide?
gavmur [86]
The most commonly accepted amount of colors on one slide is 4
7 0
3 years ago
Read 2 more answers
Other questions:
  • Derek has an interest in designing video games. What requirements should he fulfill to be a game designer?
    13·1 answer
  • Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules
    8·1 answer
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • The
    6·2 answers
  • write a program that calculates the total grade for N classroom exerices as a perfentage. the user should input the value for N
    11·1 answer
  • In science class, Patricia is giving a presentation on the different types of flowers in her community. As part of her presentat
    5·1 answer
  • Which of the following statements is NOT
    15·1 answer
  • Computer science - algorithms - flowcharts
    11·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • Which of the following is not harmful to the computer?<br> a) Trojan<br> b) Rootkit<br> c)Malware
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!