dorisspears2277 dorisspears2277
  • 21-05-2019
  • Computers and Technology
contestada

When an attacker attempts to get credit card numbers using telephone and voice technologies, it's called
a. Vishing
b. Telephishing
c. Phreaking
d. Voicing

Respuesta :

sylvain96
sylvain96 sylvain96
  • 02-06-2019

Answer:

A. Vishing

Explanation:

The term 'Vishing' is a combination of  'Voice' and 'Phishing'.

Phishing is to get personal or confidential information (like credit card numbers) by pretending to be a trusted and enticing unsuspected individuals to provide their information, believing they're dealing with a reputable institution.

The question states the hacker is using telephone and voice technologies... so it's a voice version of the phishing.

Answer Link

Otras preguntas

The Egyptians used hieroglyphics in the same way as the Sumerians used (1) ideographs (3) cuneiform (2) calligraphy (4) letters
solve the equation 7x equals 42
Given the balanced equation representing a reaction: Cu + S==> CuS + energy Which statement explains why the energy term is written to the right of the arrow
The following is a suitable topic for an expository article. A young woman overcomes obstacles and realizes she should be a musician. a. True b. False
the freedom of working for yourself is necessarily limited by
How does the absorption and release of energy affect temperature change during a chemical reaction?
Ron wrote the pattern shown below. What is the rule for following Ron's pattern? 11, 36, 86, 186
How do you write 8/11 as decimal
Why do modern scientists use repeated experiments to develop and test hypotheses?
20.   First and foremost, supervisors are     A. Leaders B.Teachers C.Counselor D. Advocates