Informatics Practices
…………… are the attempts by individuals to obtain confidential information from you through an original looking site and URL.
- Phishing scams
- Spoofing
- Eavesdropping
- Pharming
Related Questions
The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is …………… .
- Phishing
- Eavesdropping
- Scams
- PC intrusion
Which of the following is/are source of spreading viruses from one computer to another ?
- Infected data
- Infected programs
- All of these
…………… is an attempt where a hacker tries to divert network traffic to a bogus site.
- Phishing scams
- Spoofing
- Eavesdropping
- Pharming attack
A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?
- Spamming
- Phishing
- Plagiarism
- Trojan