1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the

bank's database. However, she doesn't recognize the bank, because it is not one she does business with. What type of attack is she being presented with?
A. WhalingB. VishingC. PhishingD. Piggybacking
Computers and Technology
1 answer:
marshall27 [118]3 years ago
3 0

Answer:

C. Phishing

Explanation:

There are various terms under digital attack, some of them are :

Whaling: whaling is one of the categories of phishing whose mainly targeted persons are mostly high ranked professionals.phishing search data for the hacking purpose.

Vishing: vishing is mainly termed for voice phishing. when a person calls any other person by using the name of some reputed company to get another person's personal data is known as vishing.  

Phishing: when a person uses digital communication channel i.e. emails, by using the name of some reputed company to get another person's personal data is known as phishing.

Piggybacking: when a person gets access to another person's system or telephone by the illegal way is termed as piggybacking.

so, according to the scenario most appropriate answer is option C

You might be interested in
Select the correct answers
Mashutka [201]

Answer:

Use a mixture of External and Internal Links....

Explanation:

8 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
____ [38]

Answer:

Monitor

Power supply

Explanation:

Monitor is the display unit of the computer. It carries capacitors which are charged and helps in electronic display.

Power supply is the unit which converts the AC electric supply to DC supply. It utilizes the capacitors to perform this function

While the hard drive and video card does not contain any capacitors.

4 0
3 years ago
What happens if a computer lags too much?
Makovka662 [10]

Answer:

it can overheat trying to process and from there multiple things may happen

1. the computer will recognise its overheating and automatically shutdown

2. the computer with catch on fire

3. the computer with crash the program and go back to the home screen

Explanation:

7 0
3 years ago
Read 2 more answers
Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?
xz_007 [3.2K]

Answer:

First, you need to start the OSPF process by executing the command:

<em>Router (config)# router ospf {process-ID#}</em>

Then, you have to instruct the router to advertise the networks that are directly linked to it by entering this network command with the area ID number for that network:

Router (config-router)# network {192.168.10.0} {255.255.255.0} area {0}

8 0
3 years ago
Write smallest to largest: Byte, bit, MB, PB, GB, nibble
OlgaM077 [116]

Answer:

  1. bit
  2. nibble
  3. byte
  4. MB
  5. GB
  6. PB

Explanation:

this is it!!!

3 0
3 years ago
Read 2 more answers
Other questions:
  • An array name and index are separated using ____.
    13·1 answer
  • Who is the last person appointed to the u.s supreme court
    11·1 answer
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • PLEASE HELP!<br> How do you "brainliest" an answer?
    13·2 answers
  • What is the default font style of “Title” box in MS PowerPoint 2013?
    8·1 answer
  • Identify what a computer needs to
    14·1 answer
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • after entering backstage view, and clicking account settings, what are the steps for creating a delegate for an outlook folder
    6·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
  • Describe a new career in computer science that may be created in the future
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!