FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS PHISHING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these is not a form of phishing
A
fake email
B
fake website link
C
spam
D
key logger
Explanation: 

Detailed explanation-1: -There are two main types of software keyloggers: user mode keyloggers and kernel mode keyloggers.

Detailed explanation-2: -There are different types of keyloggers. As revealed here, some of the most common types include form grabbing, JavaScript, memory injection, API and hardware. Each type works in a different way, but they are all designed to record keystrokes-typically for a malicious purpose like data theft.

Detailed explanation-3: -Software keyloggers are commonly installed through phishing or social engineering attacks. During these attacks, a victim is presented with a seemingly innocent email that’s infected with either malicious links or attachments.

Detailed explanation-4: -35. Keyloggers are a form of . Explanation – Keyloggers are a form of hardware or software spyware installed between the keyboard and operating system.

There is 1 question to complete.