Looking for answers? Westonci.ca is your go-to Q&A platform, offering quick, trustworthy responses from a community of experts. Our platform provides a seamless experience for finding reliable answers from a knowledgeable network of professionals. Connect with a community of professionals ready to provide precise solutions to your questions quickly and accurately.

Phishing:_______
a) A con executed using technology, typically targeted at acquiring sensitive information, or tricking someone into installing malicious software.
b) A term that, depending upon the context, may be applied to either, 1) someone who breaks into a computer system, or 2) a particularly clever solution.
c) When someone uncovers computer weaknesses, without exploiting them.
d) When a protester seeks to make a political point by leveraging technology tools, often via system integration, defacement, or damage.

Sagot :

Answer:

a)

Explanation:

Phishing is a type of deception in which an intruder disguises himself in email or other means of communication as a reputable individual or person. Attackers would normally use phishing e-mails to spread a range of malicious links or attachments. Some people will gather login credentials or victims' account details.

So as per above definition only option A seems the correct alternative among al the other option when discussing about Phishing.

A con executed using technology, typically targeted at acquiring sensitive information, or tricking someone into installing malicious software.