Q. A hacker contacts through email and attempts to acquire valuable personal information is called __.

A
Threatening
B
Phishing
C
Spamming
D
Bugging
Solution:
  • Phishing is the fraudulent attempt to obtain sensitive information such as usernames, password and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
  • Malware, or malicious software, is any program or file that is harmful to a computer user.
  • Malware includes computer viruses, worms, Trojan horses and spyware.
Entri PDF Icon

Get Question Bank

Strengthen Your Practice with our comprehensive question bank.

Entri Contact Image

Get Expert Advice for Free: Register for Your Free Consultation Now!