COMPUTER THREATS SECURITY
WHAT IS A HACKER
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
phishing
|
|
social engineering
|
|
Shoulder surfing
|
|
coincidence
|
Detailed explanation-1: -Shoulder surfing is an effective way to get information in crowded places because it’s relatively easy to stand next to someone and watch as they fill out a form, enter a PIN at an ATM or pay for something using a credit card.
Detailed explanation-2: -Trojan horse: A destructive program that pretends to be a useful application, but harms your computer or steals your information after it’s installed.
Detailed explanation-3: -As part of an organization’s security and data protection program, it should have a plan in place that, at minimum, mitigates risk to systems and networks arising from four common types of malicious software: trojans, spyware, viruses, and ransomware.
Detailed explanation-4: -Rootkit is a form of malware that provides the attacker with administrator privileges on the infected system, also known as “root” access. Typically, it is also designed to stay hidden from the user, other software on the system, and the operating system itself.
Detailed explanation-5: -Online interaction security technology. Typically, online transactions, such as online purchases of products or services require entering sensitive transaction information into a third-party web browser or application. This may expose sensitive transaction information to an increased risk of inadvertent disclosure.