1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
10

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f

rom a person masquerading as an employee from your bank?\
Computers and Technology
2 answers:
dalvyx [7]3 years ago
5 0

Answer:

Phishing

Explanation:

One of the most popular cyber crimes today is phishing. In phishing, an attacker disguises himself or herself as a reputable or trustworthy personnel (such as an employee from a bank) and convincingly requests (via an electronic communication such as email) that a target (any user) sends to them certain personal and sensitive information (such as passwords, pins e.t.c) about them in other to steal or abuse these information.

Phishing is done by any of the following ways, among others;

i. creating a sense of urgency in the target by telling them how important what they are about to do is and how dangerous it is if they don't do it.

ii. sending a fake or forged link to their target. A link that could take them to a site where they enter their sensitive information.

yaroslaw [1]3 years ago
3 0

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

You might be interested in
What sort of negative outcomes are possible for this type of risk?
Harlamova29_29 [7]
More details please?
6 0
3 years ago
Read 2 more answers
ACTIVITY NI MATCHING TYPE Directions: Match Column A with Column B. Write the letter of the correct answer on the space provided
Korvikt [17]

Answer:

Mark me a brainless plss i need that i am blink plss

6 0
3 years ago
Sahil is making a graphic novel in which the villain plans to reduce the rate at which energy is released from the Sun. The vill
gregori [183]

i believe the answer is b

hope this helps :)

8 0
3 years ago
Read 2 more answers
What are some positive impacts technology has on the environment?​
dsp73

Answer:

<u>technology</u> has enabled us to capture useful heat through devices such as solar panels

Explanation:

<h3 />
7 0
2 years ago
Read 2 more answers
Match the installation type to its description.
MariettaO [177]

Answer:

Following are the types of installation matched to its respective definitions.

<h3>Upgrade installation:</h3>

What you do when you have a computer with an existing operating system that needs to be upgraded.

This means that while working on a window when you get attracted by the update introduced recently and you upgrade your window accordingly.

For example: Updating a window from 8 to 10 or desired features.

<h3>Multiple boot installation:</h3>

What you do when you have several operating systems on one computer.

In this type of installation, a computer has different windows for different accounts. You can boot to the desired installed window by switching account.

<h3>Clean installation:</h3>

What you do on a brand new computer that has never been set up before and does not have an operating system on it yet.

It can be defined as the installation of window done very first time on to the computer. Sometimes when the window gets deleted due to virus or any other factor, the installation at that time will also be termed as Clean Installation.

<h2>I hope it will help you!</h2>
5 0
3 years ago
Other questions:
  • What US federal agency publishes safety standards for business and industry?
    5·1 answer
  • Uma organização pode ser entendida como uma instituição ou associação com objetivos predefinidos. Qual é um dos primeiros concei
    10·1 answer
  • Hackers who gain control over several computers can organize them into a client-server network known as a(n) __________ . This n
    7·1 answer
  • The way a program is proceed is know as control flow and are :Sequence(one line after the other), Decision-making(either this or
    8·1 answer
  • Signing up for a(n) ____ will automatically provide you with web content that is updated on a regular basis.
    15·1 answer
  • A golf ball is at rest on the grass. What must happen to cause the ball to move?
    5·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
    14·1 answer
  • 1. Give the binary equivalents for the numbers 15, 24, 102?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!