sarahabuadas1336 sarahabuadas1336
  • 22-06-2017
  • Computers and Technology
contestada

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

Respuesta :

itzpiyushsharma
itzpiyushsharma itzpiyushsharma
  • 22-06-2017
the ans is Phishing.!

Answer Link

Otras preguntas

How could an equal balance of power between the two parties in Congress be achieved?
Cody poked at the embers glowing like lava in the charred fire pit. which word does the participial modify? A) pit B) lava C) Cody D) embers
how does the structure of the office of the president help fulfill the office's role?
what is 31/10 as a mixed number?
The steps of the DNA ladder are made of _____?
What new class did colonial rule create? How did this eventually lead to the end of colonialism?
draw a figure that is less than 1/6?
Evaluate m – n when m = –1.5 and n = –7.7. A. –9.2 B. –6.2 C. 6.2 D. 9.2
the ocean closest to New York State
What is the nth term of this sequence below?    2, 5, 8, 11 , 14. ......etc.