NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Viruses
|
|
Trojan Horses
|
|
Telephone IVR phising
|
|
Worms
|
Detailed explanation-1: -There are different types of social engineering attacks: Phishing: The site tricks users into revealing their personal information (for example, passwords, phone numbers, or social security numbers).
Detailed explanation-2: -5. Which of the following is not an example of social engineering? Explanation: Carding is the method of trafficking of bank details, credit cards or other financial information over the internet. Hence it’s a fraudulent technique used by hackers and does not comes under social engineering.
Detailed explanation-3: -The most common form of baiting uses physical media to disperse malware. For example, attackers leave the bait of a malware-infected flash drives in conspicuous areas where potential victims are certain to see them.