COMPUTER FUNDAMENTALS

INTRODUCTION TO COMPUTERS

COMPUTER SYSTEMS AND COMPONENTS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is a form of spoofing where a phony webpage is created that looks just like the real webpage. It LURES you to click on it. It is usually carried out by email or instant messaging.
A
Fishing
B
Farming
C
Phishing
D
Phoning
Explanation: 

Detailed explanation-1: -A phishing website is a domain similar in name and appearance to an official website. They’re made in order to fool someone into believing it is legitimate.

Detailed explanation-2: -Evil Twin Attacks Also known as “the honeypot attack, ‘’ is a type of cyber-attack where a hacker sets up a malicious and fake Wi-Fi hotspot with the intent of stealing your personal information. Many people make the mistake of selecting a WI-FI hot spot if they recognize the name.

Detailed explanation-3: -Email phishing. Most phishing attacks are sent by email. Spear phishing. There are two other, more sophisticated, types of phishing involving email. Whaling. Whaling attacks are even more targeted, taking aim at senior executives. Smishing and vishing. Angler phishing. 31-Jan-2023

There is 1 question to complete.