Q. A hacker contacts through email and attempts to acquire valuable personal information is called __.

A
Threatening
B
Phishing
C
Spamming
D
Bugging
Solution:
  • Phishing is the fraudulent attempt to obtain sensitive information such as usernames, password and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
  • Malware, or malicious software, is any program or file that is harmful to a computer user.
  • Malware includes computer viruses, worms, Trojan horses and spyware.
Entri Contact Image

Get Expert Advice for Free: Register for Your Free Consultation Now!