COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information Hackers can secretly collect personal information and passwords
|
spyware
|
|
worms
|
|
pharming
|
|
phishing
|
Explanation:
Detailed explanation-1: -Phishing is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity using bulk email which tries to evade spam filters.
There is 1 question to complete.