APPLICATION LAYER
CLIENT SERVER APPLICATIONS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Obtain information by posing as a trustworthy entity.
|
|
Limit access to e-mail systems by authorized users.
|
|
Steal data through the use of network intrusion.
|
|
Corrupt e-mail databases through the use of viruses.
|
Detailed explanation-1: -Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Detailed explanation-2: -What is phishing? Phishing is when attackers attempt to trick users into doing ‘the wrong thing’, such as clicking a bad link that will download malware, or direct them to a dodgy website.
Detailed explanation-3: -Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication. Attackers will commonly use phishing emails to distribute malicious links or attachments that can perform a variety of functions.