adplus-dvertising
frame-decoration

Question

What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?

a.

Phishing scams

b.

Computer viruses

c.

Spyware scams

d.

None of the above

Posted under IT Fundamentals

Answer: (a).Phishing scams

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?

Similar Questions

Discover Related MCQs

Q. When does the time bomb occur?

Q. Delayed payload of some viruses is also called as

Q. What is the first boot sector virus?

Q. The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is the self replicating program called?

Q. What is anti-virus?

Q. Which of the following is not Computer Hardware?

Q. The acronym of WORM in a Computer System is

Q. To “Debug” the System means ________

Q. Which of the following is associated with error detector?

Q. An error in software or hardware is called a bug. What is the alternative computer jargon for it?

Q. A honey pot is an example of what type of software?

Q. If you receive an e-mail offering to remove you from a mailing list, what should you do?

Q. Which of the following is not anti-viruses software?

Q. Best quality of DR 'Disaster Recovery' is

Q. A deadlock exists in a system if and only if the wait for graph

Q. Backup of the source data can be created

Q. Remote backup site is sometimes called the

Q. Backup technique which is most space efficient is

Q. To decide on a backup strategy for your organization, we should consider

Q. Which of the following is not a proper state of transaction?