A perpetrator attacks phone systems to obtain free phone line access or uses telephone lines to transmit

Question:

A perpetrator attacks phone systems to obtain free phone line access or uses telephone lines to transmit viruses and to access, steal, and destroy data. What is this computer fraud technique called?

a. Phishing

b. Phreaking

c. Pharming

d. Vishing

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Accounting Information Systems

ISBN: 9781292060521

13th Global Edition

Authors: Marshall B. Romney, Paul John Steinbart

Question Posted: