COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information Hackers can secretly collect personal information and passwords
A
spyware
B
worms
C
pharming
D
phishing
Explanation: 

Detailed explanation-1: -Phishing is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity using bulk email which tries to evade spam filters.

There is 1 question to complete.