COMPUTER NETWORKING

APPLICATION LAYER

CLIENT SERVER APPLICATIONS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Phishing is an attempt to:
A
Obtain information by posing as a trustworthy entity.
B
Limit access to e-mail systems by authorized users.
C
Steal data through the use of network intrusion.
D
Corrupt e-mail databases through the use of viruses.
Explanation: 

Detailed explanation-1: -Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Detailed explanation-2: -What is phishing? Phishing is when attackers attempt to trick users into doing ‘the wrong thing’, such as clicking a bad link that will download malware, or direct them to a dodgy website.

Detailed explanation-3: -Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication. Attackers will commonly use phishing emails to distribute malicious links or attachments that can perform a variety of functions.

There is 1 question to complete.