COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
A
Converting
B
Hacking
C
Phishing
D
None of the above
Explanation: 

Detailed explanation-1: -"Phishing” (pronounced “fishing") refers to a type of attempts to acquire sensitive information. Phishing is used to steal usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Detailed explanation-2: -Phishing is defined by Wikipedia as an “attempt to obtain sensitive information such as usernames, passwords, credit card details (and indirectly, money, ) often for malicious reasons by somebody disguising himself as a trustworthy entity in an electronic communication."

Detailed explanation-3: -Phishing is a way of attempting to acquire information such as usernames, passwords, PIN, bank account, credit card details by masquerading as a trustworthy entity details through electronic communication means like e-mail.

Detailed explanation-4: -Phishing is the attempt to acquire sensitive informative such as usernames, passwords and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Detailed explanation-5: -Email phishing Phishing attacks, often delivered via email spam, attempt to trick individuals into giving away sensitive information or login credentials.

There is 1 question to complete.