Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the types of computer based social engineering attacks? Explain what is Phishing?



What are the types of computer based social engineering attacks? Explain what is Phishing?..

Answer / chaitanya

Computer based social engineering attacks are
Phishing
Baiting
On-line scams
Phishing technique involves sending false e-mails, chats or website to impersonate real system with aim of stealing information from original website.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Hacking Interview Questions

List out some of the common tools used by Ethical hackers?

1 Answers  


Explain what is Burp Suite, what are the tools it consist of?

1 Answers  


 Mention what are the types of password cracking techniques?

1 Answers  


 Explain what is Ethical Hacking?

1 Answers  


Explain what is Pharming and Defacement?

1 Answers  


Explain what is CSRF (Cross Site Request Forgery)? How you can prevent this?

1 Answers  


Explain what is Keylogger Trojan?

1 Answers  


Who is the most dangerous hacker?

0 Answers  


Who is the best hacker in the world?

0 Answers  


 Explain what is DHCP Rogue Server?

1 Answers  


Explain what is SQL injection?

1 Answers  


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)