Informatics Practices
…………… are the attempts by individuals to obtain confidential information from you through an original looking site and URL.
- Phishing scams
- Spoofing
- Eavesdropping
- Pharming
Computing Safety & Ethics
2 Likes
Answer
Phishing scams
Reason — Phishing scams involve attempts by individuals to obtain confidential information, such as usernames, passwords, and credit card details, from us by using an original-looking site and URL to deceive.
Answered By
3 Likes
Related Questions
The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is …………… .
- Phishing
- Eavesdropping
- Scams
- PC intrusion
Which of the following is/are source of spreading viruses from one computer to another ?
- Infected data
- Infected programs
- All of these
…………… is an attempt where a hacker tries to divert network traffic to a bogus site.
- Phishing scams
- Spoofing
- Eavesdropping
- Pharming attack
A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?
- Spamming
- Phishing
- Plagiarism
- Trojan