COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Many cyber security threats have human and software components. Which of the following situations describes the human component of phishing?
A
A hacker identifies a company to impersonate, then develops a believable email to distribute to a mass address list.
B
A hacker writes a program that erases the contents of a hard disk but packages it as a computer game.
C
A hacker creates an email attachment that automatically sends malicious emails to an entire address book when opened.
D
A hacker sets up a system where information collected from a malicious email is automatically inputted into a spreadsheet of private data.
Explanation: 

Detailed explanation-1: -Which of the following situations describes the human component of phishing? A hacker identifies a company to impersonate, then develops a believable email to distribute to a mass address list.

Detailed explanation-2: -Answer: B) DOS attacks can be considered a class of computer threats.

Detailed explanation-3: -Which of the following accurately describes the trust model of certificate authorities? A certificate authority is trusted by the owner of the certificate and the party relying on the certificate.

Detailed explanation-4: -Which of the following activities poses the greatest personal cyber security risk? Purchasing a chair by emailing a credit card number to the chair owner. Which of the following is considered an unethical use of computer resources? Searching online for the answers to CodeHS exercise and quizzes.

There is 1 question to complete.