COMPUTER NETWORKING

NETWORK SECURITY

INTERNET SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This technique tries to take information from the user, but the user actively gave the information. Common things taken are credit cards, usernames, passwords, and home addresses.
A
Phishing
B
Scam
C
Spyware
D
Fishing
Explanation: 

Detailed explanation-1: -Phishing is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity using bulk email which tries to evade spam filters.

Detailed explanation-2: -Phishing is a fake email masquerading as legitimate. Hackers create phishing emails through which they intend to steal your confidential information like passwords and bank account details.

Detailed explanation-3: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-4: -No, because you have no guarantee that you will regain access to your files. No, because even when you get your files back criminals might attack you later again because they are still active on your network.

Detailed explanation-5: -Which one of the following shows respect for the confidentiality of information? Discussing confidential information over the telephone.

There is 1 question to complete.