COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Gaining the trust of individuals or organisations to influence them to give confidential information.
A
Cryptolock
B
Botnet
C
DDOS
D
Social Engineering
Explanation: 

Detailed explanation-1: -By masquerading as legitimate users to IT support personnel, they grab your private details-like name, date of birth or address. From there, it’s a simple matter to reset passwords and gain almost unlimited access. They can steal money, disperse social engineering malware, and more.

Detailed explanation-2: -Encrypting data, emails, and communication ensure that even if hackers intercept your communication, they can’t be able to access the information contained within. This can be achieved by obtaining SSL certificates from trusted authorities.

Detailed explanation-3: -Phishing is the most common type of social engineering attack, typically using spoofed email addresses and links to trick people into providing login credentials, credit card numbers, or other personal information.

Detailed explanation-4: -Phishing. Phishing is the most common type of social engineering attack. Pretexting. Baiting. Quid Pro Quo. Tailgating. CEO Fraud. 01-Mar-2023

There is 1 question to complete.