COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following are forms of social engineering:
A
Phishing
B
Farming
C
Fishing
D
Blagging
E
Shouldering
Explanation: 

Detailed explanation-1: -Phishing. Whaling. Diversion Theft. Baiting. Honey Trap. Pretexting. SMS Phishing. Scareware. More items •12-Dec-2022

Detailed explanation-2: -In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim’s shoulder.

Detailed explanation-3: -Baiting. As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. Pretexting. Phishing. Spear phishing.

There is 1 question to complete.