COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following does not fall into the category of social engineering attacks?
A
MITM attack
B
Spear phishing
C
Shoulder surfing
D
Tailgating
Explanation: 

Detailed explanation-1: -5. Which of the following is not an example of social engineering? Explanation: Carding is the method of trafficking of bank details, credit cards or other financial information over the internet. Hence it’s a fraudulent technique used by hackers and does not comes under social engineering.

Detailed explanation-2: -There is a predictable four-step sequence to social engineering attacks, typically referred to as the attack cycle. It includes the following: information gathering, establishing relationship and rapport, exploitation, and execution.

Detailed explanation-3: -Phishing. Whaling. Diversion Theft. Baiting. Honey Trap. Pretexting. SMS Phishing. Scareware. More items •12-Dec-2022

Detailed explanation-4: -Baiting. As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. Pretexting. Phishing. Spear phishing.

There is 1 question to complete.