COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which apply to phishing?
A
The art of catching aquatic animals with a rod
B
Using a malicious medium, disguised as a trustworthy source, to get users to reveal personal information
C
Physically threatening someone until they give up personal data
D
Personally hacking someone to get personal information
E
Usually an attack made via email
Explanation: 

Detailed explanation-1: -Most phishing attacks are sent by email. The crook will register a fake domain that mimics a genuine organisation and sends thousands of generic requests. The fake domain often involves character substitution, like using ‘r’ and ‘n’ next to each other to create ‘rn’ instead of ‘m’.

Detailed explanation-2: -Email phishing is the most common type of phishing, and it has been in use since the 1990s. Hackers send these emails to any email addresses they can obtain. The email usually informs you that there has been a compromise to your account and that you need to respond immediately by clicking on a provided link.

There is 1 question to complete.