COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:
A
Phishing
B
Privilege escalation
C
Backdoor access
D
Shoulder surfing
Explanation: 

Detailed explanation-1: -A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as: Phishing.

Detailed explanation-2: -A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as: Phishing.

Detailed explanation-3: -Pharming is a social engineering technique in which the attacker executes malicious programs on a victim’s computer or server and when the victim enters any URL or domain name, it automatically redirects victim’s traffic to a website controlled by the attacker. This attack is also known as “Phishing without a Lure".

Detailed explanation-4: -Social engineering is the practice of manipulating people in order to obtain confidential or sensitive data.

Detailed explanation-5: -Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication. Attackers will commonly use phishing emails to distribute malicious links or attachments that can perform a variety of functions.

There is 1 question to complete.