1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the

bank's database. However, she doesn't recognize the bank, because it is not one she does business with. What type of attack is she being presented with?
A. WhalingB. VishingC. PhishingD. Piggybacking
Computers and Technology
1 answer:
marshall27 [118]3 years ago
3 0

Answer:

C. Phishing

Explanation:

There are various terms under digital attack, some of them are :

Whaling: whaling is one of the categories of phishing whose mainly targeted persons are mostly high ranked professionals.phishing search data for the hacking purpose.

Vishing: vishing is mainly termed for voice phishing. when a person calls any other person by using the name of some reputed company to get another person's personal data is known as vishing.  

Phishing: when a person uses digital communication channel i.e. emails, by using the name of some reputed company to get another person's personal data is known as phishing.

Piggybacking: when a person gets access to another person's system or telephone by the illegal way is termed as piggybacking.

so, according to the scenario most appropriate answer is option C

You might be interested in
Which of the following is an antivirus software?
kotegsom [21]

Answer:

McAfee

Explanation:

An antivirus is a standalone software that protects other software. On the other hand, a Firewall is capable of preserving both software and hardware on the network.

4 0
2 years ago
When Creating a game ( Which I Am, FPS ofc ) what are the basic rules would you want to add
Gnesinka [82]

Answer:

2 ig

Explanation:

5 0
3 years ago
Using a conversation voice is part of:
MaRussiya [10]
Need more information
4 0
3 years ago
Match each code snippet to its appropriate markup language name
Mazyrski [523]

Answer:

Please find the complete solution in the attached file.

Explanation:

8 0
3 years ago
Make a hierarchical directory structure under /root that consists of one directory containing three subdirectories.
Alika [10]
You can make a hierarchical directory structure under /root that consists of one directory containing subdirectories  by using cd and mkdir
the mkdir command created the directories while the cd command changes which directory you're currently in
5 0
3 years ago
Other questions:
  • Creating calendar events prevents individuals from being able to schedule a time to collaborate.
    11·1 answer
  • Want is the assignmment
    8·1 answer
  • Which of the following is a characteristic of the internet today? distributed network central hub lack of protocols absence of c
    5·1 answer
  • An application with which you can perform calculations on numbers and work with other data
    8·1 answer
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • In a program you need to store identification numbers of 5 employees and their weekly gross pay.
    11·1 answer
  • What is connectivity?
    15·2 answers
  • How do we prevent electrical problems as prescribe by the course?​
    11·1 answer
  • Greenpeace used "Mister Splashy Pants" to:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!