COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following are forms of social engineering:
|
Phishing
|
|
Farming
|
|
Fishing
|
|
Blagging
|
|
Shouldering
|
Explanation:
Detailed explanation-1: -Phishing. Whaling. Diversion Theft. Baiting. Honey Trap. Pretexting. SMS Phishing. Scareware. More items •12-Dec-2022
Detailed explanation-2: -In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim’s shoulder.
Detailed explanation-3: -Baiting. As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. Pretexting. Phishing. Spear phishing.
There is 1 question to complete.