COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
It is a form of cyber attack that attempts to make the user give up their sensitive information by disguising as a legitimate person or entity thru e-mail, messaging app, or telephone.
A
Man-in-the-Middle Attack
B
brute force
C
malware attack
D
phishing
Explanation: 

Detailed explanation-1: -Phishing attacks, often delivered via email spam, attempt to trick individuals into giving away sensitive information or login credentials.

Detailed explanation-2: -Phishing is a way of attempting to acquire information such as usernames, passwords, PIN, bank account, credit card details by masquerading as a trustworthy entity details through electronic communication means like e-mail.

Detailed explanation-3: -Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.

Detailed explanation-4: -Phishing (pronounced: fishing) is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information–such as credit card numbers, bank information, or passwords–on websites that pretend to be legitimate.

Detailed explanation-5: -Phishing uses fear and urgency to its advantage, but pretexting relies on building a false sense of trust with the victim.

There is 1 question to complete.