Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is phishing?

Answer Posted / shashank

Phishing is 1 of hacking method basically used to gain the
victims information for malicious purpose.Its normally done
by using spam mails,commercial websites. The best
precaution is do not click on unknown links.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the idea behind the Bell-La Padula model?

2238


What is the difference between cybersecurity and information security?

1064


What is proxy firewall?

951


What is shadow it?

917


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

864


What is the general data protection regulation (gdpr)?

1000


What are the types fo ddos attacks?

1030


What is a DNS resource record

1010


Where do you get updates on security?

974


If you need to encrypt and compress data for transmission, how would you achieve it?

1053


What is an information security management system (isms)?

1041


Is vpn traffic encrypted?

1017


Can you give me some ransomware variants?

944


How does the HTTP handle state?

998


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

899