COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
| Question 
 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
 | 
 Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information Hackers can secretly collect personal information and passwords 
|  |  spyware 
 | 
|  |  worms 
 | 
|  |  pharming 
 | 
|  |  phishing 
 | 
 Explanation: 
Detailed explanation-1: -Phishing is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity using bulk email which tries to evade spam filters.
 There is 1 question to complete.