COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
It occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
A
IP Spoofing
B
Email Spoofing
C
IP Stealing
D
Phishing
Explanation: 

Detailed explanation-1: -IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source. Perpetrators of IP spoofing trick their victims into interacting with a phony Web site.

Detailed explanation-2: -A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

Detailed explanation-3: -An acceptable use policy, also known as an AUP, is a kind of agreement that outlines the appropriate use of access to a company’s network or the internet by detailing what users may or may not do when utilizing these platforms.

There is 1 question to complete.