COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is an example of a “phishing” attack?
A
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
B
Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
C
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
D
All of the above
Explanation: 

Detailed explanation-1: -For example: The user is redirected to myuniversity.edurenewal.com, a bogus page appearing exactly like the real renewal page, where both new and existing passwords are requested. The attacker, monitoring the page, hijacks the original password to gain access to secured areas on the university network.

Detailed explanation-2: -It is an internet scam done by cyber-criminals where the user is convinced. digitally to provide confidential information.

Detailed explanation-3: -Phishing happens when an unsuspecting victim responds to fraudulent requests that demand action. This action can include downloading an attachment, clicking a link, filling out a form, updating a password, calling a phone number, or using a new Wi-Fi hotspot.

There is 1 question to complete.