Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the types of computer based social engineering attacks? Explain what is Phishing?



What are the types of computer based social engineering attacks? Explain what is Phishing?..

Answer / chaitanya

Computer based social engineering attacks are
Phishing
Baiting
On-line scams
Phishing technique involves sending false e-mails, chats or website to impersonate real system with aim of stealing information from original website.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Hacking Interview Questions

 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

0 Answers  


What tools do real hackers use?

0 Answers  


Explain what is Enumeration?

1 Answers  


What laptops hackers use?

0 Answers  


 Explain what is DHCP Rogue Server?

1 Answers  


Explain what is Burp Suite, what are the tools it consist of?

1 Answers  


 Mention what are the types of password cracking techniques?

1 Answers  


Explain what is SQL injection?

1 Answers  


What are the 3 types of hackers?

0 Answers  


Explain what is Keylogger Trojan?

1 Answers  


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

0 Answers  


Who is the best hacker in the world?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)