COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
A
Botnet
B
Firewall
C
Password
D
Spoofing
Explanation: 

Detailed explanation-1: -Phishing attacks often involve creating fake links that appear to be from a legitimate organization. These links may use misspelled URLs or subdomains to deceive the user.

Detailed explanation-2: -Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its connection.

There is 1 question to complete.