Which of the following best describes: PHISHING?   an act of pretending to be another person for the purpose of entertainment or deception.   hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable.   a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Social Engineering Reference Sheet 

Which of the following best describes: PHISHING?

 

an act of pretending to be another person for the purpose of entertainment or deception.

 

hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable.

 

a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware

 

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

 

to trick into believing or accepting as genuine something false and often preposterous

 
 

Which of the following best describes:  HOAXES?

 

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

 

to trick into believing or accepting as genuine something false and often preposterous

 

an act of pretending to be another person for the purpose of entertainment or fraud.

 

a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware

 

hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable.

 
 

Which of the following best describes:  BAITING?

 
Question 3 options:
 

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

 

to trick into believing or accepting as genuine something false and often preposterous

 

an act of pretending to be another person for the purpose of entertainment or fraud.

 

a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware

 

hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable.

 

Which of the following best describes:  SPOOFING?

 
Question 4 options:
 

to trick into believing or accepting as genuine something false and often preposterous

 

a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware

 

an act of pretending to be another person for the purpose of entertainment or fraud.

 

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

 

hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable.

 

Which of the following best describes:  IMPERSONATION?

 
Question 5 options:
 

hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable.

 

an act of pretending to be another person for the purpose of entertainment or fraud.

 

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

 

to trick into believing or accepting as genuine something false and often preposterous

 

a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware

Expert Solution
Step 1

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Which of the following best describes: PHISHING?

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education