Challenger App

No.1 PSC Learning App

1M+ Downloads
The fraudulent attempt to obtain sensitive information such as usernames passwords and credit card details are called as?

APhishing

BDenial of Service

CSalami Attack

DNone of the above

Answer:

A. Phishing

Read Explanation:

  • Phishing

  • Phishing is a type of social engineering attack where attackers deceive victims into revealing sensitive information through:

1. Fake emails, texts, or messages

2. Spoofed websites or links

3. Malware or spyware

Other types of phishing:

1. Spear phishing (targeted attacks)

2. Whaling (targeting high-profile individuals)

3. Smishing (SMS-based phishing)

4. Vishing (voice-based phishing)

  • Common phishing tactics:

1. Urgency or scarcity scams

2. Fake login pages

3. Malware attachments

4. Deceptive links


Related Questions:

വാനാക്രൈയ്‌ക്കെതിരെ മൈക്രോസോഫ്റ്റ് എഞ്ചിനീയർമാർ വികസിപ്പിച്ച പ്രോഗ്രാമർ
The cyber crime in which data is altered as it is entered into a computer system most often by a data entry clerk or a computer virus is called as
കേരളത്തിൽ ഏറ്റവും കൂടുതൽ സൈബർ കേസ് റിപ്പോർട്ട് ചെയ്യുന്ന ജില്ല
Which of the following is not a type of cyber crime?
What is the name given to the malicious software that is considered to fall between normal software and a virus?