COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:
A
Zero-day attack
B
MITM attack
C
Social engineering
D
Backdoor access
Explanation: 

Detailed explanation-1: -An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as: Shoulder surfing.

Detailed explanation-2: -Social engineering is the art of manipulating people into performing actions or divulging confidential information. Social engineering applies to trickery used for information gathering or computer access and in most cases the attacker never comes face-to-face with the victim.

Detailed explanation-3: -Social engineering is the practice of manipulating people in order to obtain confidential or sensitive data.

Detailed explanation-4: -Hacking is a term used to describe unauthorized access to systems, networks, and data (hereafter target). Hacking may be perpetrated solely to gain access to a target or to gain and/or maintain such access beyond authorization.

Detailed explanation-5: -A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as: Phishing.

There is 1 question to complete.