1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
4 years ago
10

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f

rom a person masquerading as an employee from your bank?\
Computers and Technology
2 answers:
dalvyx [7]4 years ago
5 0

Answer:

Phishing

Explanation:

One of the most popular cyber crimes today is phishing. In phishing, an attacker disguises himself or herself as a reputable or trustworthy personnel (such as an employee from a bank) and convincingly requests (via an electronic communication such as email) that a target (any user) sends to them certain personal and sensitive information (such as passwords, pins e.t.c) about them in other to steal or abuse these information.

Phishing is done by any of the following ways, among others;

i. creating a sense of urgency in the target by telling them how important what they are about to do is and how dangerous it is if they don't do it.

ii. sending a fake or forged link to their target. A link that could take them to a site where they enter their sensitive information.

yaroslaw [1]4 years ago
3 0

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

You might be interested in
. Network navigation devices, such as routers, help datatravel in bundles that are referred toas………..
nataly862011 [7]

Answer: packets

Explanation:

Network navigation devices, such as routers, help data travel in bundles that are referred to as packets. As, networks that transfer the data in small packets are known as packet switching network and that packets carry the data using the internet and the protocol and each of the packet contain some information and data to navigate.

3 0
3 years ago
Which tab and group will allow the insertion of rows and columns in a worksheet?
ivanzaharov [21]
Home tab, cells group
5 0
3 years ago
Read 2 more answers
All the processing-of work-done on a computer is performed by the what?
Nat2105 [25]
It's computed by the processor
6 0
4 years ago
What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?
lesya [120]

Answer:

/etc/timezone

Explanation:

Debian based Linux distribution is a free distribution software and an operating system. It is composed of a open source and free source software. It is one of the most popular distributions.

A computer file name is a unique system of identifying the computer stored file in the file system. The names of the different file system have different formats or extensions in the file name and imposed different file restrictions.

In the context, the full path and the file name of a file that displays a time zone settings on a Debian Linux distribution is " ../etc/timezone".

3 0
3 years ago
Select the correct answer. Hudson has to maintain confidential college data in a spreadsheet. He needs two team members to help
AlladinOne [14]

Answer:

B. Protection

Explanation:

It is the protection tab. We can protect a cell from being changed or altered by any other user of the excel sheet using the protection tab. We only need to select the cell, and right-click, Now choose the protection tab, which will be shown. And now select locked and click ok. This cell cannot then be changed by anyone else other than you. Hence, the correct option here is the protection tab.

4 0
3 years ago
Other questions:
  • Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
    10·1 answer
  • Easy STEAM question :)
    15·2 answers
  • If you have a windows 8, but want the features of windows 8 pro, purchase and install _______.
    7·1 answer
  • 1. What is the central idea of the section "Service Record." Use two text details to
    8·1 answer
  • Give a linear-time algorithm to sort the ratios of n given pairs of integers between 1 and n. I.e., we need to sort, within O(n)
    5·1 answer
  • One of your professors has asked you to write a program to grade her midterm exams, which consist of only 20 multiple-choice que
    15·1 answer
  • Creating a chart using a spreadsheet Chart Wizard involves four steps. Which is the last step?
    6·1 answer
  • Translation of a file into a coded Format that occupies less space than the original file is called
    6·1 answer
  • What does SFA software provides tools for
    11·2 answers
  • 45 points!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!